1 b. 2 C. 8 O d. 3

Correct and detaild Answer will upvote else downvote

Transcribed Image Text: How many reserved bits to defines the class B?
Select one:
?. 1
b. 2
C. 8
O d. 3

Correct and detaild Answer will upvote else downvote Sub:-Principles of Programing Langiages In what fundamental way do operational semantics and denotational semantics differ?

the  numbers of employees  hired in different  companies  are 36  60     71      91      16     61 find the  midrange roundup to 2  devcimal digits

32. Windows which is based on computer NT technology is called a. windows 2000 b. windows 98 c. windows 3.1 d. Windows 95

Which of the following is a social engineering technique that uses flattery on a victim? a. Conformity b. Friendliness c. Fear d. Ingratiation

Transcribed Image Text: Q2) Write code in VB.NET using “do .. while” to solution the following :
14
5 + xy?
*
i=6

If someone have front panel header pins, but the header pins are not labeled, how will they know which pins they should use?

Write program prints the sum of negative numbers, positive even numbers and positive odd numbers in a given list. Give answer in python

Write a function that finds eucliadean distance between two points. Ex: x1=0 y1=0 x2=1 y2=1 Distance= 1.4142 write in python and show output

The relationship among the data and objects which are stored in the database called application database, and referred by the Application programs explain?

Eee303 4b Transcribed Image Text: b) Expand extensively on firewalls regarding network security in our data
communication. Buttress your input with appropriate diagrams.

Q1- Level 0 – Can we create a table in hive from a file which is there on S3, True/False, Justify your answer.

1 b) What are the correct parenthesis brackets for lists, tuples, dictionaries and sets? Explain each of these built-in data types in detail.

2a. On the IAS, what would the machine code instruction look like to load the contents of memory address 2 to the accumulator?

Human Computer Interaction In an application system, proper usage of warning messages shows (Choose one) a. Safety b. Efficiency c. Learnability d. Memorability

(True/False): When an interpreted programme written in language L1 runs, a programme written in language L0 decodes and executes each of its instructions.

An RPC (remote procedure call) is initiated by the a. server b. client c. both (a) and (b) d. none of the mentioned

What is the purpose of the WHERE clause in SQL? Which comparison operators can you use in a WHERE clause? Give few examples

i need the answer quickly Transcribed Image Text: HW(2) (Write C++ program to add
two elements a[1][2] with a[2][1] for
2D Array (4*4)

Which of the following expressions is closest in value to 1?

A) .09
B) 1.011
C) 99 ÷ 100
D) 100 ÷ 99

Write a program that must show the use of given functions of stack class of C++ STL. a) push() b) pop() c) top()

You as a project manager were asked to develop an Inventory Control Management Information System. Apply the three sphere model for system management

Clarify what Machine Learning is and why it’s important. What role does it play in analytic CRM? Explain your argument with an example?

Give an example of what you mean by PRODUCT in relation to one of the eight principles of the ACM/IEEE Code of Ethics.

. Let Q, R and S be sets. Show that (R – Q) ? (S – Q) = (R ? S) – Q.

VLANs can_________. a. reduce network traffic b. provide an extra measure of security c. either (a) or (b) d. both (a) and (b)

Transcribed Image Text: Design AM-DSBS system and FM system. Show the
message signal , carrier signal and Transmitted signal.
Show the demodulator part

Transcribed Image Text: 25
sin2k logk
k=1 Transcribed Image Text: Q1) Write MATLAB commands to calculate the following summation
and write your result:

i need the answer quickly Transcribed Image Text: 5. Which name must be
unique within a database?
Table
Filed
Record
All of above

Digital design Transcribed Image Text: The 4-variables Karnaugh-map has
Select one:
O 4 cells
O 8 cells
O 16 cells
O 32 cells

7 Transcribed Image Text: SNR calculated in dB uses the formula
a.
10log10 (SNR)
O b. 10log2(SNR)
O . 10loge(SNR)
O d. 20log10(SNR)

Please solve quickly. Transcribed Image Text: b) Show how you can perform an
8 bit permutation using a single
concatenation operator in VHDL.

Which of the following is the data type used to hold decimal numbers? a. double b. int c. byte D. single to. short

Write a program in C++ to take input two positive integers from user and print the XOR of both these numbers in output.

How do you start the process to reinstall an OS on a laptop computer using the backup files stored on a recovery partition?

424. Two or more programs can be executed at a time in process of a. Concurrent-programming b. Uni-programming c. Multi-programming d. Batch programming

In comparison to alternative network security mechanisms, such as those at the application layer, what are the advantages and disadvantages of using IPSec?

Integer in 64 bit operating system takes . Bytes of memory. a) 2 Bytes b) 1 Byte c) 4 Bytes d) 8 Bytes

1.) Explain why there could be reasons to believe that Information System and people are the driving force behind developments in Information Technologies.

Write a function that will Swap two adjacent elements by adjusting only the links (and not the data) using a singly linked lists?

When and why would you and would you not use one of the following : Twofish Blowfish Message Digest Secure Hash Algorithm RIPEMD

In ____________, the operand is provided as part of the instruction. a. Register Addressing b. Immediate Addressing c. Direct Addressing d. Stack Addressing

Python 6. Write a source code to take a string from user and count the number of vowels present in it. use sets

In C++ take input two char variables from user and find the difference between their ASCII value. Display the obtained result in output.

Transcribed Image Text: Lec -1
pr
2- Write a C++ program to read A[20] elements randomly and
find the largest
one between them

q6) A file is a logical structure which is stored in ___________ memory. a. External Memory b. RAM c. None d. Internal Memory

Add “Welcome to C++” to the following fragment of code run: char x[60]; cin >> x; cout << x; what will be printed? Q-3: What is meant by inheritance in java, give a simple real life example? AND write a simple java code related to inheritance. Want Correct and detailed Answer Transcribed Image Text: What are the security issues Ellgamel ? 1). Low modulus Attack 2). know P-T Attack Code the given class design in C++ using OOP concepts. Transcribed Image Text: employee name number manager scientist laborer title publications club dues Discover and discuss at least three efficient methods to ensure that the company’s data and other online applications remain safe in the cloud. The first microprocessor built by the Intel Corpn. was called A. 8008 B. 8080 C. 4004 D. 8800 E. None of the above Given a Boolean expression: Y = A.B + (A.B.(A+B)) Find the value of Y in the case when A= 0 and B= 1. Transcribed Image Text: Question 2: Suffix Trees Construct a suffix tree with Farah’s algorithm for the following substring: S=acbbabbbabba$, Draw the obtained tree. 1 b) What are the correct parenthesis brackets for lists, tuples, dictionaries and sets? Explain each of these built-in data types in detail. describe how a computer executes an instruction. Note: This should be relating to the components of the architectures and describe the fetch-execute cycle Transcribed Image Text: False) the following, use (A=10 , B=5 , K=4, J=0.5 B. Answer with (True and I=3) or (A/B*J.GT.1.0R. K.GE.B).AND.(K**J.LT.3.OR. .NOT.I.NE.3) Transcribed Image Text: Java compiler translates Java source code into O assembly code machine code O another high-level language code O Java bytecode Write a statement that displays the picture saved at index 0 in an ImageList control called slideShowImageList in a PictureBox control called slideShowPictureBox. 1) Wi-Fi is transmitted at two frequency bands 5 GHz and a) 2.5 GHz b) 5.2 GHz c) 4 GHz d) 2.4 GHz In what context does it make sense to claim that two select statements from the same table are union compatible with one another? Transcribed Image Text: The method that can be used to create new properties and also to modify the attributes of existing properties is We cannot send the digital signal directly to the channel, when the channel is a. bandpass b. Bypass c. baseband d. Low pass When must physical security and information technology (IT) security work together to be deployed, managed, and maintained in an orderly and consistent manner? Make a comparison and contrast between database management system and file-based system, and explain each of them with the aid of specific examples What are the different kinds of networks? With the use of examples and diagrams, explain it. Also, describe how computers are used nowadays. Which of the following are the vulenerabilties/threats. Select one: a. All of these b. Trojan Horse c. Spyware d. VIRUS Clear my choice Transcribed Image Text: An Array is a. Complex data structure b. Non-linear data structure c. a linear data structure d. None of these 162. In DBMS, the property of interest which further describes the entity is classified as a. relationship b. abstraction c. entity d. attribute Correct and detailed Answers will be given ?else down voted Write Python Program to Print all the Prime Numbers within a Given Range Transcribed Image Text: 5. In Unix, Which system call creates the new process? a._fork b. create c. new d. None of the above Explore and analyze technically the differences between cloud computing and virtualization. Your explanation should include at least two valid points with detailed explanation. The next section describes in detail how each of the fundamental concepts of the cybersecurity discipline is utilized to achieve overall system security. To implement an interface, a concrete class must implement AT LEAST ONE method headings listed in the definition of the interface. False. True. Identify the following computer ports and components on your instructor’s display: List the ports on the front and rear of your computer case. Write the regular expression for the language accepting the strings which are starting with 1 and ending with 0, over the set €={0,1}. Is interrupt service routine anything you’ve heard about before? Because of this, the interrupt service routine’s last instructions utilize IRET instead of RET. Are fines or other penalties appropriate for the owners of the zombie machines in order to encourage individuals to properly protect their systems? What is an Event? Briefly discuss the following Events, provide examples. (2) a) Focus events (3) b) Keyboard events (3) c) Mouse events A NOT gate’s output is different from its input: ? g Gate(g) ? (Type(g)=NOT) ? Signal (Out(1, g))  = Signal (In(1, g)) . If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address? Transcribed Image Text: Write a program in C++ to print a shape below: 1 4 4 9 16 25 36 49 64 81 9. Which of the following has a real time clock? a) Galileo Gen 2 b) Rasberry Pi c) Arduino d) Rasberry Pi 3 Describe the most comm on way in which relationships in an E-R diagram are expressed in a corresponding relationa l data mod el. What is RAM, exactly? Make two lists. To what extent is it used to store program data when used in embedded computers? Explain. Transcribed Image Text: Write program to get atray of double [ 10] trom input and Calculate the sum and averoge of it. an The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. Web designers use non-animated GIFs and rich media assets to create their advertising banners. Choose one of the following options: True or False. Computer Science: What is the difference between starting a data modeling project with a packaged data model on a clean sheet of paper. Transcribed Image Text: 34. When the number of requests for corrective maintenance increases, it is an indication for declining in maintainability. True False A locally installed application is an example of which application architecture? A N-tier B One-Tier C Two Tier D Three Tier E Multi-tier 12 Transcribed Image Text: 12 For which value of k, the following system is consistent? 2x-5ky+6z=0 kx+2y-2z=0 2x+2y-kz=0 | : 1 5 2 Write the program using C Language Only Transcribed Image Text: Prove truth of formula below using mathematical induction. k(3k +7) 5+8+11+…+(5+3(k –1)) = 2 Transcribed Image Text: In optical fiber cables, a glass or plastic core is surrounded by a of less dense glass or plastic. Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ? Password management applications, one of which is a stand-alone application and another of which is a browser-based application. Which would you recommend? Why? _______________ is a processor with a shared L3 cache. a. Intel Core Duo b. ARM11 MPCore c. AMD Opteron d. Intel Core i7 In Java take input two char variables from user and find the difference between their ASCII value. Display the obtained result in output. 163. A …………… connection provides a dedicated link between two devices. a. point – to – point b. multipoint c. primary d. secondary Transcribed Image Text: Write a program in a C++ program to get the maximum integer number of twenty numbers, then draw its flowchart. Explain the below figure. Your answer should contain a minimum of two paragraphs(Each paragraph should at least have a minimum of 150 words) Transcribed Image Text: The Cartesian Product B xA is equal to the Cartesian product A x B? Select one: O True O False Why Java is not a Fully Object Oriented programming Language describe with proper reason identification. How to make java a fully object oriented? Project management is a key enabler of organisational strategy”. 2.1 State whether you agree or disagree with this statement and justify your answer Artificial Intelligence Transcribed Image Text: Translate to FOL: Sister of John does not like chocolate * SisterofJohn(chocolate) like(sisterofJohn, chocolate) -like(sisterofJohn, chocolate) O other: What is the index number of the last element of an array with 9 elements? a) 9 b) 8 c) 0 d) Programmer-defined 59. Top of the window which displays the program’s name consist of a. menu bar b. thumbnail c. dialog box d. title bar 132. Repeater operates in which layer of the OSI model? a. Physical layer b. Data link layer c. Network layer d. Transport layer Is it possible to increase RAM size to enhance overall process execution performance? What are the advantages and disadvantages of increasing RAM size? Why is cybersecurity an ethically significant public good? Identify at least 2 cybersecurity ethical best practices an organization should carry out and how? Transcribed Image Text: Write a loop that counts and outputs the number of odd integers in the range 25 (exclusive) to 125 (inclusive). Prove, by using the rules of logic, that syllogisms with ‘A’ type conclusion are only valid for first figure syllogism having mood AAA. Which of the following pieces of code will not be accepted by the Python interpreter? Select one -print(True + 10) -float(10e.1) -print(int(‘50’,8)) -print(int(‘10’,16)) How would you bring the total number of bytes up to 46 if the data file is 30 bytes in an Ethernet packet? Given a standard memory size of 215 blocks, briefly explain how many addressable locations can be accessed by a SIC machine and why 5 Transcribed Image Text: Single mode optical fiber has a much smaller diameter than multimode optical fibers Select one: O True O False What is concurrency control? State and explain any 4 concurrency controls protocols and examine the protocols that can be used to prevent conflict. Convert the Following 1. (111.11)2 ( )10 2. (42.34)8 ( )10 3. (7894)10 ( )16 4. (1101.1101)2 ( )16 5. (499)8 ( )16 Discuss Contingency Planning for Image Acquisition Clarify Information Security Governance and state five guidelines on how an effective Information Security Governance is achievable. What is a current snapshot of the security of an organization? a. Vulnerability appraisal b. Risk evaluation c. Threat mitigation d. Liability reporting using R Studio Create a Dataframes which contain details of FIVE(5) employees( Name,Employee Number,Gender, Age and Designation) . Display summary of the data. Central Computer which is powerful than other computers in the network is called as __________. a. Client b. Server c. Hub d. Switch None Transcribed Image Text: Which of the followings is not a Boolean operator? && 11 None of the above All of the above In hardware, the failure rate of hardware is quite high early in its life, and this is represented by what kind of curve? how did the shift from face-to-face to virtual communication affect and limit the ways, means, depth, substance, and quality of our communication process Correct and detailed Answers will be given ? else down voted 34. Write Python Program to Determine all Pythagorean Triplets in the Range? Don’t copy Transcribed Image Text: Use the VMware workstation or any similar program to install and configure a schedule backup service. (recorded video) What is the meaning of recursion in C? What is the difference between iteration and reiteration? Provide appropriate supporting evidence for your response. Which computer-based information system uses data from TPS and analytical tools to support middle managers? a. ESS c. DSS b. MIS d. TPS The observer architecture Whether an object is interested in knowing if a certain state changed, a pattern may be used to alert it. The term_________is sometimes used to identify anyone who illegally breaks into a computer system. a. hacker b. cyberterrorist c. Internet Exploiter d. cyberrogue If computing the statement: x = (x * y / z); how can you use the assert macro to avoid division by zero? 74. Job pool is the program of the operating system that is located in a. RAM b. ROM c. hard disk d. CD 55. First in producing a program is to a. define the need b. design a program c. plan a program d. calculate cost What is the output of the given code? if 79>78 puts “True”.upcase if 9>8 puts “True”.reverse if 7==7 puts “equal”.downcase end end end

Transcribed Image Text: QUESTION 2
In ASN.1 SEQUENCE data type used to list items where order is optional ( not mandatory)
True
False

Design a 4 to1 mux using NAND gates / NAND Implementation. Again design a 4 to mux using transmission grates. Show FET improvements

Question. Design a layout in Android Studio Requirements: 1 ImageView 1 textview 1 button 1 checkbox 1 radio button 1 switch 1 calenderView

Do Transcribed Image Text: The recurrence relation
T(1) = 2
T(n) = 3T (n/4) + n, has the solution then T(n)
equals to

We don’t prioritise view serializability since any conflict-serializable schedule is also view serializable, so why should we stress conflict serializability over view serializability?

What were some of the data security and privacy concerns that made the Veterans Administration (VA) and its assets more vulnerable to attacks?

341. A method used to force one thread to wait for another thread to finish. a. join() b. connect() c. combine() d. concat()

Transcribed Image Text: Which of the following is not a legal variable identifier
O a. num_1
O b. 1_num
_Inum
O d. _numl

Why we will evaluate any business model and how we can perceive our business solution that will provide actionable insights to the business.

Write a code to program to remove all whitespace from a string. Use string = Hello, my name is Henry. Do In Kotlin

Can you tell me whether there is a distinction between incremental and iterative development? Explain each of these using your own personal experiences.

Write a lambda expression that takes as input an integer and returns the factor which, multiplied with the input, gives your student numbe

Write a program that must show the use of given functions of stack class of C++ STL. a) push() b) pop() c) top()

With an example, discuss the many kinds of software resources that may be shared in a distributed system. Could you just explain briefly?

None Transcribed Image Text: The sets A= {x e I: x <-1 or x > 1} then A = [-1; 1]
Ture
False

173. The graphical representation of database description is called a. dynamic schema diagram b. schema diagram c. structure diagram d. entity path diagram

The following is true or false: In a multimodule programme, an END statement with a label occurs just once, in the beginning module.

python write a program to find a random string that conatins uppercase lowercase  digits punctuationa and the length of string must be 20

26. Which of the following primarily uses guided media? a. cellular telephone system b. local telephone system c. satellite communications d. radio broadcasting

The heart of the selling process is ________________.

Select one:

a.
Closing the sale

b.
The sales meeting

c.
Account maintenance

d.
Hand

Transcribed Image Text: PROCESSES ENABLES TO DO THINGS FASTER AND IS CONSTRUCTS SYSTEMS IN A MODULAR FORM.
Select one:
a.COOPERATING
b.COMPETING
c.COMPULSORY
d.CONCURRENT

107. In incremental process model, some high-end function are designed in a. construction framework b. modeling framework c. planning framework d. deployment framework

203. The services provided for the user are described in which section? a. System requirements b. User requirements c. System models d. Appendices

What differentiates a weak entity from a strong entity that is needed to have a connection with another entity is not immediately apparent.

Write a java program that reads a sets of integers and then finds and print the sum of the even and odd integers

How many check bits are required for 16 bit data word to detect 2 bit errors and single bit correction using hamming code?

148. Uniform memory access for accessing memory from any unit takes a. same time b. different time c. less time d. more time

Transcribed Image Text: What is the minimum header size of an IP packet?
16 bytes
10 bytes
32 bytes O
20 bytes O

Transcribed Image Text: {orom” : n20}
n 20 Transcribed Image Text: (2) Provide a context-free grammar (CFG) for the language in Question 1.

Why do you suppose the method area of a JVM is global to all of the threads running in the virtual machine environment?

Take input a string in C++ and print the number of digits present in it. Print zero if no digit is present .

4 Transcribed Image Text: In optical fiber, the core has a higher refractive index than the cladding.
Select one:
O True
O False

Transcribed Image Text: A matrix in which there is only one row and
any number of columns is said to
* .be
matrix

A set of expressions is unifiable if and only if there exists only one (unifying) substitution that make the expressions identical. i-True ii-False

What is the technique in which an application supports only a certain number of specific colors, creating a palette from which to choose?

Cse Transcribed Image Text: For the graph given below, draw the portion of the state space tree generated by procedure (MCOLORING).
2
4

What do you think CIOs and CISOs should know and what steps should they take now to address these potential new cybersecurity threats?

Follow the evolution of system architecture, with a focus on the effect of the personal computer and the Internet. Include examples if possible.

Describe the function of each of the interfaces required to integrate ADO Net as a technology for connecting ASP Net to BA solutions.

Consider the Sun Solaris operating system for user level and kernel level threading? Explain only pros and cons of Solaris OS threading approach?

In your opinion, how can Information Technology transform the way business processes in any organization are handled. Explain two ways NB. no plagiarism

Transcribed Image Text: (c) KINDLY determine F in the sum of minterms and product of maxterms
F = A+ BC’
formats
(AN 7ma

19. A program at the time of executing is called ________. a. Dynamic program b. Static program c. Binded Program d. A Process

Transcribed Image Text: Write HTML code to insert an image on
internet page and make it a hyperlink
opened in the another page

What are three characteristics of big data and how do they relate to the information collected by healthcare practitioners, such as mercy data?

If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address?

In dynamic channel assignment strategy, base station requests channel from ____________ a) MSC b) Neighbouring cell c) Neighbouring cluster d) Neighbouring base station

Logic Desgin Transcribed Image Text: Which of the following is the biggest 4-digit Hexadecimal even number?
a.
FFEE
Ob.
FFEE
FFFE
d.
EEEE

None Transcribed Image Text: I met her while I… in Paris
lived O
live O
was living O
none of the above. O

Transcribed Image Text: Which keyword is used to define friendship relationship between a function and a class?
Select one:
a.friendfunction
b.friends
c.friend
d.myfriend

Using assembly language find out the sum of the first 56 terms of the arithmetic sequence 1, 5, 9, 13, … in DX,

By use phython:
Write a program to find words with less than 5 letters in a text and store them in a list

169. Each tablespace in an Oracle database consists of one or more files called a. Files b. name space c. datafiles d. PFILE

Transcribed Image Text: Q3/Design a Real Time System by connect 7
inputs with 8085, one of the seven inputs
connects to TRAP interrupt.

Layer 7 protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? How?

Transcribed Image Text: 10. What is the format pandas used for serialisation of pandas objects?
A. pickle
B. csv
C. json
D. obj

If communication software can be called the “traffic cop” of a micro communication system, then what should the modem be called? Bridge why?

I’m not sure what routing is, or how it works. It is important to understand the differences between two commonly used routing techniques.

Why should you use Lee’s technique for routing if there is no compelling reason to? TELL US WHAT YOU THINK AS A DESIGNER.

Calculate the percentage availability of a system with an MTBF of 4000 Hours and you had 100 hours of downtime and 10 stops.

44. A single channel is shared by multiple signals by a. digital modulation b. multiplexing c. analog modulation d. none of the mentioned

Transcribed Image Text: Give output for c++ code
#include
using namespace std;
int x[100];
int main()
{
cout << x[99] << endl; } What is the best way to get older technologically challenged healthcare professionals to embrace the use of information systems within their work practice? Discuss five (5) computer security attacks from inside and outside an organization as well as proposing relevant measures to mitigate the security threats. Transcribed Image Text: The system BIOS is stored on nonvolatile memory called Transcribed Image Text: Most current motherboards continue to provide several slots Identify and list down any 5 benefits of a network-based security device that controls the flow of incoming and outgoing traffic (Network permiter) If you want to improve your comprehension, take use of cloud computing and social networking sites, such as LinkedIn, to develop your knowledge. Could you kindly explain what grid computing and cloud computing are? What about a discussion of the distinctions between grid and cloud computing? Exercise 3: Multiple Scatter plots Generate scatter plots between every pairs of numerical columns from the “iris” dataframe as a set of subplots 12. Logical extension of multiprogramming of operating system is a. time sharing b. multi tasking c. single programing d. both a and b What are the purposes of the following application software categories? Project management software Desktop publishing software Database and spreadsheet software Word processing software Transcribed Image Text: 4. Show how Horner’s algorithm and the division algorithm can be use to find az when converting (137)10 to (a,an-1azaja0)2 A connection between two end points, either physical or logical, over which data may travel in both directions simultaneously is called Duplex explain? If communication software can be called the “traffic cop” of a micro communication system, then what should the modem be called? Bridge why? 137. Repeater operates in which layer of the OSI model a. Physical Layer b. Network Layer c. Data link Layer d. Transport Layer write a program that uses input to prompt a user for their name and then welcomes them. Enter your name: Chuck Hello Chuck Find the least two instances of the n- Queens problem that have no solutions N= 2 N= 3 Transcribed Image Text: Q Q Transcribed Image Text: Derive State Table and Draw State Diagram of the given clocked sequential Circuit J Clk K B CIk |K Clock Artificial Intelligence Transcribed Image Text: Translate to FOL: Bella, Kitty and lucy are all cats * Cat(Bella)^ Cat(kitty)^Cat(Lucy) Cat(Kitty, Bella, Lucy) Cat(Kitty^Bella*Lucy) Other: Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ? Transcribed Image Text: 4 Which of the following is a Flip-Flop? O All answers are correct O D O J-K S-R O T 8. Which one of the following is not a real time operating system? a. VxWorks b. Windows CE c. RTLinux d. Palm OS What controls the order in which things happen when a user runs a programme in a text-based environment, such as the command line? Follow the evolution of system architecture, with a focus on the effect of the personal computer and the Internet. Include examples if possible. . Explain how an interface designer can protect users of a collaborative interface (e.g. e-mail or Facebook interface) from hostile or malicious behavior. In an ideal implementations of a queue, all operations are ______________________ . O(1) O(n) O(n log n) O(n2) it depends on the operation IN ASSEMBLY Suppose there were no PUSH instruction. Write a sequence of two other instructions that would accomplish the same as push eax? Write a program in d language to get the size of int, char, long short,double, along, a short, ubyte and print the result Can you answer the question? Transcribed Image Text: 3. In traffic theory, there are three ways lost calls are handled. What are they? Artificial Intelligence Transcribed Image Text: Translate to FOL: The cat of Suzi is Brown * Brown(CatOfSuzi) CatofSuzi(Brown) All of above None of above Show me how to use h1 heading tag in HTML. Use the heading as: “HTML Headings” Write HTML code and show output screenshot. What value will z have if we execute the following assignment statement? Please elaborate on your answer. int z = 50 / 10.00; Transcribed Image Text: 9. Write a C++ program to sort array elements in an ascending or descending order according to the users’ choice. 328. What does ‘b’ represent in a processor wait ratio? a. input ratio b. output ratio c. average time d. average I/O time Transcribed Image Text: 3 ?Which of the following is a Flip-Flop S-R O D O J-K O TO All answers are correct O Computer Science: What is the difference between starting a data modeling project with a packaged data model on a clean sheet of paper. Total memory in Bytes occupied by 10 integers, 10 char variables: a) 20 Bytes b) 40 Bytes c) 50 Bytes d) 30 Bytes Correct and detailed Answers will be given ?else down voted Write Python Program to Swap the First and Last Value of a List . Explain how an interface designer can protect users of a collaborative interface (e.g. e-mail or Facebook interface) from hostile or malicious behavior. Identify FOUR (4) fact finding techniques and explain the appropriate situations where they may be applied and ONE (1) advantage of each technique. Various systems put disk folders at different track positions on the disk for a reason, right? In each case, what are the benefits? Although ECC memory costs more than non-ECC memory, why would you choose to use it? Which type of computer typically requires ECC memory? When did Hewlett-Packard Inc. Introduce its first HP-110 laptop computer? A. 1984 B. 1986 C. 1990 D. 1995 E. None of the above 2) Write a ALP to implement an NOR gate and store the result in the memory location 8000H. Note: Please do not handwritten. Write a program to print “Hello Coder!” 5 times using loop but in same line and not in different lines. Separated by space. 174. Model which maps components into physical computing environment is a. analysis model b. polyment model c. design model d. use case model Write SQL query for following: Fetch the details of all Juices which have price less than 30 from the table: Juice(Name, Price, Rating) In this sample web address, which part identifies the name of the Web server? http://www.example.com/page2 a. example.com b. page2 c. http d. :// Flag question: Question 47 There is an important difference between a significant result and a meaningful result. Group of answer choices A.True B.False C program that finds the row and column of the smallest element of a 10×10 array, whose elements are randomly assigned between 1-100. Which one of the following represents the commonly used domain name for .org.? Select one: a. education b. commercial c. organization d. country 352. Separation of user logical memory and physical memory is ___________ a. Memory control b. Memory management c. Memory sharing d. Virtual memory Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ? py You want to initialize parts of a class definition once at the time a class is defined, not when instances are created. Construct a JK flip-flop using a D flip-flop and derive its function table Use a electronic workbench program and screenshot of the output What do you think of when you hear the term “programming style”? Are there any common guidelines for what constitutes excellent programming style? INDIRECT PROOF: 1) A ? ( B ? C ) 2) B ? ( D ? E ) _____________ Therefore ~A V D Transcribed Image Text: GIven the statement below: intA=(3,6,9}, A.length can’t be used to display the number of elements in the array True False Outline a transaction scenario that may lead to a deadlock in a distributed system and propose a scheme whereby deadlocks may be avoided. a. If an optimal solution can be created for a problem by constructing optimal solutions for its subproblems, the problem possesses __________ property. Explain how the three properties of big data (volume, velocity, and diversity) relate to the data gathered by Mercy and other healthcare organizations. 29- In public innovation undertakings, the user becomes part of the governmental or public sector innovation process. Select one: a. False b. True Determine the Maximum Subarray Sum using the Divide and Conquer approach for the following array: [ -3 9 4 9 -5 -2 ] Use a tree to test whether the following argument is valid or invalid. If it is invalid, read offa counterexample. 1.A?B 2.¬A ?¬B 2- Which HTML code produced the output: MUSCAT, “OMAN ” ? a. MUSCAT,OMAN b. MUSCAT, OMAN c. MUSCAT,OMAN d. MUSCAT,OMAN

Digital design Transcribed Image Text: Which of the following is equivalent to (A+C)(B+C)(B+D)(A+D)?
Select one:
O AB+CD
O A+B+C+D
O ABC+BCD+ACD+ABD
O AD+BC

What controls the order in which things happen when a user runs a programme in a text-based environment, such as the command line?

What controls the sequence in which things happen when a user executes a program in a text-based environment, such as the command line?

Web designers use non-animated GIFs and rich media assets to create their advertising banners. Choose one of the following options: True or False.

Correct answer will be upvoted , else rated negatively. Part B) .What are the steps that are followed while drawing the deployment diagram.

231. The standard V92 can upload data at the rate of a. 144 kbps b. 33.6 kbps c. 48 kbps d. 56 kbps

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

Transcribed Image Text: The following waveforms are applied to the inputs of SR latch,
Delermine the Q waveform. Assume initially Q = 1.

C++ Which function is used to check whether a character is an alphabet or number? a) isalpha() b) isalnum() c) isdigit() d) isblank()

11. C language Prompt the user to enter an integer n and find if the number n is a fibonacci number or not.

Practically demonstrate how Service Oriented Architecture is implemented and what is the difference between SOA and micro-services. Your answer should be technically elaborated.

Q1)Use C code to declare a tagged structure called Date which holds members called month, day,and year which are in integer data type.

Transcribed Image Text: Homework
????? ????? ?????? ????? ??? 8-6-2021
Question Design synchronous counter to produce the following binary
sequence .Use J-K-flip-flops
0,1,2,3,4,7,6,5,0

Why have power supply and heat dissipation limits become such a significant design restriction for microprocessors and their associated systems over the years?

MP3 encoding Explain in your own words what is meant by masking effects in acoustics and what role they play in MP3 compression.

Transcribed Image Text: 16. Which of these factors may affect perfective maintenance. [Multiple Answers] *
Team stability
Ethical responsibility
Hardware Specifications
Program structure

In the boolean expression Y(A,B,C)=(A+B*+C) (A*-B*+C), the term A*+B*+C* is a_………where * means complement maxim um term maxterm C mintem O sum term

The next section describes in detail how each of the fundamental concepts of the cybersecurity discipline is utilized to achieve overall system security.

I need the answer as soon as possible Transcribed Image Text: Rust
Make a string variable and print that string
variable in rust

In which phase is a prototype of the website often created? a. Design phase b. Conceptualization phase c. Production phase d. Analysis phase

In C#, you must __________ a variable before you can use it to store data. a. cite b. associate c. declare d. instance

_______ encoding has a transition at the beginning of each 0 bit. a. RZ b. Manchester c. Differential Manchester d. All the above

How do you change the code such that it also shows the highest count as well as the student with the highest count?

44. A computer used at supermarkets, departmental stores and restaurant etc is called ______ terminal a) P-O-S b) Dumb c) Intelligent d) Smart

Draw a flowchart to find the volume and total surface area of a cylinder using the inputted length and diameter of the user.

Write a program to take input a string and reverse it using an inplace linear time algorithm. Print the reversed string in output.

164. Single processor is the processors of the computer system containing a. 1 Processor b. 2 Processors c. 3 Processors d. 4 Processors

Assuming an application has an array of integers named intNumbers, write code that writes the contents of the array to the file numbers.txt

If you want to improve your comprehension, take use of cloud computing and social networking sites, such as LinkedIn, to develop your knowledge.

Transcribed Image Text: 4
What is the type of the relationship in
the following figure? *
Employee
Organization
Association
Composition
O Generalization
Dependency

What kinds of procedures are in place to detect: (a) Network sniffing is a kind of network reconnaissance. (c) Is wiretapping a possibility?

Q. RDBMS is the basis for ______, and for all ________________________ such as MS SQL Server, IBM DB2, Oracle, MySQL, and Microsoft Access.

Transcribed Image Text: 2. The following program below returns the maximum of the elements in a list.
max ( [X|List],Max):-
maxlist ([X |List],X,Max).

Indicate if the following expression is True or False Assume the variables int a=3, b=4, c=6; !((a + b – c) > 3)

Compare a uni-process system with a multi-process system in the following: The need for synchronisation Performance evaluation Run time system 1s of programming

A type of line printer that uses an embossed steel band to form the letters printed on the paper is Band printer explain?

Within a WSC most of the applications fit on a single-array. Those which need more than single array use Sharding , Partitioning explain?

Consider the Sun Solaris operating system for user level and kernel level threading? Explain only pros and cons of Solaris OS threading approach?

What mechanism should I use to insert nodes into a data structure so that insertion, deletion, and searching take less time than O(n)?

A full binary tree can be generated using ______ A) in-order traversal B) post-order traversal C) post-order and pre-order traversal D) pre-order traversal

Using your own suitable example code and diagrams, explain how the following database concepts are implemented: i) Trigger; ii) Function; iii) Stored Procedure.

class Test { public static void main(String[] args) { for (int i = 0; true; i++) System.out.println(“Hello”); break; } } } Find output.

Find any errors in the following program. include int main (void) { printf(‘hi how r u’); printf(‘c language ‘); return 0; }//ain

Transcribed Image Text: The command to open a file named sensor.txt to read is
fopen (“sensor.txt”,”r”);
fopen (“sensor.txt”,r);
fopen (“sensor.txt”,”w”);
O fopen (sensor.txt,”r”);

Discuss the installation procedure for Windows Server 2012 and how it may be configured for a maximum of ten users in an organization.

A(n)_________is one or more collaborative documents, such as an encyclopedia. posted on the Web that can be viewed and changed by the public.

Transcribed Image Text: 3. Explain about the operators used for recovery
techniques.
Answer:
4. List the various types of anomalies in DBMS.
Answer:

If you are browsing for www.xxyyzz.com website, explain how this domain name will be converted to the IP address to reach the server.

1a. Explain Project Benefit Realization b. state and explain the five (5) main broad processes of Enterprise Governance of Information and Technology (EGIT)

You as a project manager were asked to develop an Inventory Control Management Information System. Apply the three sphere model for system management

If you are one of the ultra wealthy technopreneurs what kind of technology do you want to develop to help during this pandemic?

Back tracking ( DAA) Give correct answer else downvote Draw the state space tree for m- coloring when n= 3 and m= 3

Is it possible for STM32G071RB to read analogue signal with maximum spectrum frequency of 48MHz? What are the ADC settings for this task?

What were some of the data security and privacy concerns that made the Veterans Administration (VA) and its assets more vulnerable to attacks?

Identify which of the following is a valid variable name by checking the box. If this isn’t the case, please explain. pay Rate

71. An object can have which of the following multiplicities? a. Zero b. One c. More than one d. All of the above.

166. Multicore systems of the computer system are well suited for a. database b. web servers c. designing d. both a and b

Explain the following terms as associated with Asymptotic Notations and Analysis of Algorithms. i. ? Notation(Big Oh) ii. ? Notation(omega) iii. ? Notation(theta)

Transcribed Image Text: QUESTION 10
The main protocol of the network layer of the TCP/IP model is
DNS
O ICMP
O IP
ARP

Suppose a signal travels through a transmission medium and its power is reduced to one-half. What would be the attenuation (loss of power)?

What does it mean when you talk about a local variable? There are a few statements that may make use of local variables.

Program to Convert byte array to hex value Pick byte array = ( 10, 2, 15, 11) Sample output : 0A020F0B Use kotlin

Digitization Briefly explain in your own words the concepts of sampling, sampling frequency, and quantization in the context of digitizing an analog signal.

16 Transcribed Image Text: Telephone lines are considered as
channels.
a. band pass
O b. low pass
O. band reject
d. high pass

Various systems put disk folders at different track positions on the disk for a reason, right? In each case, what are the benefits?

Perl Write a program in which it provides the user to enter the user name then print  the greetings like hello + name

Transcribed Image Text: 32. Which of these factors may affect perfective maintenance. [Multiple Answers] *
Team stability
Ethical responsibility
Hardware Specifications
Program structure

A register in the microprocessor that keeps track of the answer or results of any arithmetic or logic operation is the: accumulator explain?

Most computer operating systems have _______ capabilities, which allow them to run two or more tasks, jobs, or applications at the same time.

State the policy settings by which we can adjust  Windows handles storage devices to better suit our needs with the storage device policy.

What were some of the data security and privacy concerns that made the Veterans Administration (VA) and its assets more vulnerable to attacks?

What is the purpose of an online form, and what are the functions of the controls and widgets in a web form, exactly?

What is the distinction between the java.io and java.nio packages? 2. What is the distinction between an absolute path and a relative path?

You as a project manager were asked to develop an Inventory Control Management Information System. Apply the three sphere model for system management

Transcribed Image Text: Q2: (A) Briefly explain the following (C
a. Well-known port numbers.
b. TCP is a reliable and connection-oriented transport protocol.

Which of the following options will cause the execution of your queries to be slowed? Indexes Query Optimizer Linear Search Indexes Query Optimizer

What is the process of DevOps? What kinds of issues does DevOps help people with? What are the advantages and disadvantages of DevOps?

What two conditions must be met before an entity can be classified as a weak entity? Give an example of a weak entity

In the Ring topology, each computer acts as repeater make error detection and boosts the signal before sending it on. TRUE OR FALSE.

26 The transaction Business Model follows the approach to provide users with a comfortable online communication platform. Select one: a. True b. False

Compare and contrast AWS network access control lists (NACLs) and security groups. What is the best way to secure virtual networks in AWS?

23. An 24 bit address generates an address space of ______ locations . a. 1024 b. 4096 c. 2 ^ 48 d. 16,777,216

In JAVA WAP to print Natural numbers from 1 to 100 without using even a single digit in the code and use strings.

An RPC (remote procedure call) is initiated by the a. server b. client c. both (a) and (b) d. none of the mentioned

Why we will evaluate any business model and how we can perceive our business solution that will provide actionable insights to the business.

Is a computer with a 4GHz clock always more efficient than a computer with a 3GHz clock? Explain why in your own words

Consider the function F(A,B,C)= A(B+C) + B’C + A’ and implement it using Universal Gates.
i. NAND gates only.
ii. NOR gates only.

Write a C++ program to find the number of alphanumeric characters in any string taken input from user. Print the result in output.

Using C++ !! Transcribed Image Text: 3. Write C++ program to print the following figures using the for statement:
$$
$$$
$$$$
$$$$$

Transcribed Image Text: 23- what is the speed up of
computer that execute 100
instruction on five stage pipeline
machine? *
Your answer

Write a Program in java to print a string  and then don’t end the compiling till it get ‘Q’ Or q from user

Modem is the name of the device that converts computer output into a form that can be transmitted over a telephone line? Why?

Transcribed Image Text: A 4 byte float has the value: OX3E800000. Its value as a floating point number is:
+0.0
0.125
0.25
+Infinity

Is a real-time graphics environment required for a flight simulator program used to educate pilots how to fly an airplane? Explain your answer.

What is the 8085 Assembly Language Instruction That do the follwing Copies the contents of the source into the destination register or memory.

31 The name of a word document displays in ____ Select one: a. Home tab b. Ribbon c. Title bar d. Status bar

Write a program in C++ language to take input 10 Integers and print the minimum of all of them, don’t use array etc.

Which one of the following represents the commonly used domain name for .org.? Select one: a. education b. commercial c. organization d. country

With an example, discuss the many kinds of software resources that may be shared in a distributed system. Could you just explain briefly?

Transcribed Image Text: _is a property of the entire relation,
A_
rather than of the individual tuples in which each
tuple is unique.

A(n)_________is one or more collaborative documents, such as an encyclopedia. posted on the Web that can be viewed and changed by the public.

121. Addresses of interrupt programs of operating system are placed at a. RAM b. ROM c. interrupt vector table d. interrupt service routine

With an example, discuss the many kinds of software resources that may be shared in a distributed system. Could you just explain briefly?

Write a program in js to add key value pair in an object and print that Note that you must use dot notation

In python define a function called indexCh. It will take string from user and removes the nth index character from the non-empty string.

In MS Access, to ensure that a promised date valued entered must a future point in time, _________ validation rules can be used?

write A oop c++ program in which class nam is BSCS and object name is Obj1. And define template function in this program.

Solve the following and show all work i) 34 % 5 ii) 14 + 5 % 2 – 3 iii) 4 % 6

Is the following comment written using si ng le- line or multi-line comment symbols? II This program was written by M. A. Codewriter

In C# if you want to update customer data in database then what are the steps to update that data from Windows Form.

Write a statement that displays the picture saved at index 0 in an ImageList control called slideShowImageList in a PictureBox control called slideShowPictureBox.

List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware.

The collection of toolbars Microsoft applications like Word and Excel have, where most of the application functionality can be found, is called the

Identify whether or not the chromatic number of a cyclic graph cn with n vertices is either 2 or 3 in this problem.

Identification and brief discussion of the purpose of some of the tools and methods utilized in the system development process will be required.

The applications of the Client and Server Model are a. World Wide Web b. Network Printing c. Email d. All of the above

I need the answer as soon as possible Transcribed Image Text: To empty the command window use the
* command (clear)
True
False

We had given a character and you have to find to ASCII value of  this character and print the output. In Kotlin please

The controller and main class of a java programme that is linked to the log olin page must be combined in some way.

Which of the following types of channels moves data relatively slowly? a. wideband channel b. voiceband channel c. broadband channel d. narrowband channel

In addition to keeping the antivirus program’s virus definitions current, what other ways can you protect a computer or mobile device from viruses?

Transcribed Image Text: 1. Is the following code correct? Give reasons for your answer.
int bigger(int p1, int p2) { return (p1>p2)?p1:p2; }

The physical layer concerns with a. bit-by-bit delivery b. process to process delivery c. application to application delivery d. none of the above

Computer Science What is the challenge with a software product line where the scope is too narrow in terms of global Factor issues?

268. First graphical user interface of the operating system appeared in Xerox alto was in a. 1965 b. 1973 c. 1983 d. 1992

When a packet does not fulfil the ACL criteria, the packet is _________

a.
Destroyed

b.
Resend

c.
Acknowledged As Received

d.
Dropped

Describe a situation in which you could use one of the four access control measures. What makes you choose one above the others?

In MS Access, to ensure that a promised date valued entered must a future point in time, _________ validation rules can be used?

The next section describes in detail how each of the fundamental concepts of the cybersecurity discipline is utilized to achieve overall system security.

PLZ help with the following IN JAVA Any constant variables defined in an interface must be defined as: public private protected package access

Each language has a set of rules that must be strictly followed when writing a program. What is this set of rules called?

Please solve Quickly C++ programming language Transcribed Image Text: = In code below k
;int i=2.j.k
j = i+1
:k = i*j
;cout<19 && x < 99) is a conditional statement in C++ to check if x is between 19 and 99. True False Is it a reasonable for a process under OS control to be repeatedly in: “running” <-> “wait” states? Explain why or why not.

Explain the hierarchical pyramid (classification) of memories in terms COST, Capacity and Speed (access time). Provide the mentioned features to each memory type.

What are the functions of each of this infographics.

Statistical infographics.

Informational infographics.

Timeline infographics.

Process infographics.

Geographic infographics.

Comparison infographics.

erarchical infographics.

Transcribed Image Text: Write C++ program using fiunction to calculate the average of two mmbers
entered by the user in the main program?

Using your home network as an example, explain how you would use Personal Firewalls and a Network Firewall to secure your home network?

10 One of the direct benefits of e.government is improving the delivery of public services to citizens Select one: a. False b. True

1. What is the exact number of bytes (correctly) in a system that contains (a) 32K bytes? (b) 64M bytes? (c) 6.4G bytes?

What is your first action when windows reports that your hard drive is developing bad sectors? run scandisk with the “thorough” option why?

The next section describes in detail how each of the fundamental concepts of the cybersecurity discipline is utilized to achieve overall system security.

given the string line , create a set of all the vowels in line. assign the set to the variable vowels. using python

What mechanism should I use to insert nodes into a data structure so that insertion, deletion, and searching take less time than O(n)?

1.3 What are the binary encodings of the message “Hello, World”? Using the following character code sets: ? EBCDIC ? ASCII, ? Unicode

Write a C++ program to find the number of alphanumeric characters in any string taken input from user. Print the result in output.

195. In system boot the computer hardware starts in a. user mode b. kernel mode c. supervisor mode d. both b and c

If a check box is not selected, what value is contained in its Checked property? a. True b. Unchecked c. False d. Unselected

Which parameter describes the destination directory which would contain the archive? a) -archiveName b)c) d) none of the mentioned

APIPA and DHCP are compared and contrasted. How can incorporating both of these protocols into a network benefit the users of the network?

With an example, discuss the many kinds of software resources that may be shared in a distributed system. Could you just explain briefly?

Transcribed Image Text: The digital storage oscilloscope is providing
a non permanent communication between
the user and measurement .
Select one:
True
False

Transcribed Image Text: A network Router device connects
*.two or more_networks
LAN O
WAN O
Both LAN and WAN networks O
None O

Good Answer plz Which scanf() statement will you use to scan a float value (a) and double value (b)? Float a; Double b;

In Fortran F95 language prompt the user to enter the radius of a circle and in output print the perimeter of that circle.

9. Bluetooth is an example of a. personal area network b. local area network c. virtual private network d. none of the mentioned

Transcribed Image Text: 39. Given the follwing Frame control field (802.11 version,control,CTS,1,0,1,1,0,1,1,0)
From the above, The frame subtype is Contention-free? *
True
False

What are the most widely used interior and exterior routing protocols in today’s networks, and how did they come to be so widespread?

Describe the scheduling techniques that the operating system can employ to manage I/O demands on disks. Draw attention to the benefits and drawbacks.

define a program by overriding similar functions to perform the arithmetic functions on two numbers using the concept of virtual function using c++

Write a c++ program in which 2 string are given. And you have to concate both of them and print ba new string

i need the answer quickly Transcribed Image Text: Local Variable is
Global Variable is
Function prototype is
Function signature is
Function body is

_____________software provides a means for managing all the Data associated with the product development, engineering design, production, support, and disposal of manufactured products.

Is a real-time graphics environment required for a flight simulator program used to educate pilots how to fly an airplane? Explain your answer.

Come up with an example of an error that leads to a defect, and how you would apply source inspection and mistake proofing

Describe the various considerations in choosing the means of financing a project. Evaluate the use of project management software to enhance project cost

What are the four main goals of cryptography? Explain the difference between symmetrical and asymmetrical encryption and the need to accomplish both objectives.

4 Transcribed Image Text: In optical fiber, the core has a higher refractive index than the cladding.
Select one:
O True
O False

What kinds of procedures are in place to detect: (a) Network sniffing is a kind of network reconnaissance. (c) Is wiretapping a possibility?

In C++ write a program to take input 2 strings and in output print the string whose last character has greater ASCII value.

You as a project manager were asked to develop an Inventory Control Management Information System. Apply the three sphere model for system management

Show me how to use h1 heading tag in HTML. Use the heading as: “HTML Headings” Write HTML code and show output screenshot.

57. A ________ is a set of rules that governs data communication. a. forum b. protocol c. standard d. none of the above

TRUE OR FALSE

the tree diagram is utilized to track action items with increasing detail in order to achieve a high level goal.

Please answer asap I need the solution, thanks. Transcribed Image Text: 7. Generate a Boolean expression from the logic diagram below.
M
N

In JAVA WAP to print Natural numbers from 1 to 100 without using even a single digit in the code and use strings.

c# Write program that asks to enter an x numbers and sum the even numbers and odd numbers separately then print the sum?

Transcribed Image Text: a
Question
Design a 16 people voting system. Transcribed Image Text: Question
Construct a 3*8 Decoder using only 5*32 Decoder(s)

Write a c++ program in which 2 string are given. And you have to concate both of them and print ba new string

Design an algorithm to align two sequences A and B so that mismatches and indels do not both occur within the same alignment.

Although ECC memory costs more than non-ECC memory, why would you choose to use it? Which type of computer typically requires ECC memory?

What are the difficulties in using an attribute grammar to describe all of the syntax and static semantics of a contemporary programming language?

assistance with brief paper explaining the responsibilities and importance of each of the five key technologies in the overall system. Examine their connection.

Transcribed Image Text: What are the values of these sums? Show each step and calculations.
E-0 2 · (-3)’)
b. E?-?(? +)
a.

Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ?

In hardware, the failure rate of hardware is quite high early in its life, and this is represented by what kind of curve?

A ByteBuffer receives data from the channel and the read method returns the number of String read Select one: a. True b. False

In what ways may virtual private networks (VLANs) help an organization? There are several factors to consider (such as scalability, compliance, and expenses).

71. Word Length of a Personal Computer is ______: a) 4 Bits b) 8 Bits c) 16 Bits d) None of The Above

========================================== Transcribed Image Text: Given L1 = {red, yellow} and L2 = {?, orange, ish}, List the elements of L;Lz in lexicographic
order.

List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware.

which command allows for one off running of scheduled tasks by a normal user ? a) cron b) anacron c) at d) atq

Various systems put disk folders at different track positions on the disk for a reason, right? In each case, what are the benefits?

y=-3 to 3 increment to 0.1 x=-3 to 3 increment to 0.1 z=(x^2-y^2)*exp(-x^2-y^2); plot this on matlab output must be on pc matlab

What is the name of the word that is used to refer to the comparison of computer outputs with the matching input documents?

Transcribed Image Text: Q1:- Solve the following DEs:-
1) (1+x²)dy – y²dx = 0
|
2) y’ = x csc y sin x

Discuss in details at least five (5) things to consider when purchasing a laptop computer and explian the economic beneftis of using computers.

I am beginner in java Write a program to write to multiply  two number those number taken from user and print the result

Describe a situation in which you could use one of the four access control measures. What makes you choose one above the others?

What do you call a program that performs a specialized task, such as a virus scanner, a file-compression program, or a data-backup program?

Is a real-time graphics environment required for a flight simulator program used to educate pilots how to fly an airplane? Explain your answer.

True or False. Transcribed Image Text: PSD is an example of Raster images
O a. False
O b. True
Previous page
Next page

Compare Random Forest vs. Ensemble Learning, ( Convolutional Neural Networks (CNN) vs. GAN ) and (Strong AI vs. Weak AI) with each other.

Explain the differences and similarities between database management systems and file-based systems, using concrete examples to illustrate each point of comparison and contrast.

Transcribed Image Text: What does child class inherit from the parent class?
Select one:
a.private members
b.constructor
c.friend function(s)
d.none of the above

Transcribed Image Text: Explain Routing Potential Problems in a superscalar systems and elaborate the figures (a), (b)
and (c) using some suitable example

Transcribed Image Text: Elements of an array have the same
O a. value
O b. index
O c. data type
O d. scope

chapter 15 a. Describe the OOP concept of inheritance. When is it appropriate to use inheritance? b. Describe the OOP concept of polymorphism.

None Transcribed Image Text: Matlab programming
Plot z= x^2-y^2 where x and y varies from
-2 to 2 and form a 3d shape

Transcribed Image Text: Do you think it is possible to show the start and the end of a bit? explain how?
Your answer

Transcribed Image Text: The 8088/8086 can operate in
protected mode O
real mode O
Register indirect addressing O
Based indexed addressing mode O

Create a flowchart that will ask the user for his/her age and will determine whether he/she is a minor (0-17) or an adult.

any idea regarding an online shopping enterprise. As a result of using Visual Studio 2017, I’m looking for something simple rather than complex.

What is the range of values that x can hold after this statement is executed? double x = Math.random() * 10 + 100;

What is an IP address and what is its significance in a computer network system ? Identify the classes of IP addresses ?

20. Which of the following is not the element of computer desktop? a. icons b. task bar c. START button d. title bar

Transcribed Image Text: In 8255, Group B consist of Port B and the lower half of Port-C.
Select one:
O True
O False

What are the benefits of using monads to program with effects in a pure functional language, show a small example for each benefit.

Transcribed Image Text: Q1.(b)“A queue can be implemented with two stacks, a stack can also be implemented using two
queues”, Justify the statement.

When the user types input into a TextBox control, in which property is it stored? 1. Input 2. Text 3. Value 4. Keyboard

_____________is a type of data mining in which past data is combined with assumptions about future conditions to forecast the outcomes of occurrences.

In 8085 Instructions only Transcribed Image Text: Exchange the contents of BC and DE registers without using any other
MPU general purpose register.

The physical layer concerns with a. bit-by-bit delivery b. process to process delivery c. application to application delivery d. none of the above

Transcribed Image Text: Why default gateway address is configured on a
host? Which device should the default gateway
address be considered?
A- BI

Show step by step procedure for sorting following data items stored in an array using insertion sort technique. 29   10   14   37   13

Quickly please Transcribed Image Text: 10. In a software process, the software architectural model is a*
Deliverable
Role
Functional requirement
Non functional requirement

Write a statement that will convert the Base 3 string 21201 to a numeric integer and store the result in the variable num

Which of the following security features is put into place to ensure correct authorization ? Password policies Automatic updates Account permissions Multi-factor authentication

Suppose an attribute of the composite primary key is also stated to be candidate for becoming the main key. What would you say?

HCI The choice of operations and services offered on the screen through ……………………. (Choose one) a. None b. Menus c. Pointers d. Toolbars

Write a program in C++ language that reads text from the keyboard and then prints this text on the screen in large letters

Note:- Correct Answer I will upvote else downvote Define data flowgraph and data flow machines.? List the different variables in data flow analysis.

Each server in a computer dedicated server network is known as a. dedicated server b. dedicated receiver c. dedicated client d. dedicated sender

Transcribed Image Text: Which unit orchestrates the performance of the computer’s
resourceS.
a. Control unit
O b. Cache
O C. RAM
d. ALU

Explain FOUR (4) steps for Project Communication Management Processes. List FIVE (5) keys to good communications. Explain ALL the communications Management Plan Contents.

class Test { public static void main(String[] args) { for (int i = 0; true; i++) System.out.println(“Hello”); break; } } } Find output.

Transcribed Image Text: Do you think it is possible to show the start and the end of a bit? explain how?
Your answer

Identify the sequence of the nodes for each required traversal type. Breadth-first Search Traversal Transcribed Image Text: A
C
?
E
D
F

Transcribed Image Text: 9. Requirements engineering is *
An iterative process
O A sequential process
O A dynamic process
All of the above

Identify any three fundamental conceivable computer flaws, as well as any troubleshooting techniques you might want to use to resolve each of them.

1. How do I fix remote procedure call failed? 2. Is RPC secure? What causes RPC Server Unavailable? 3. Does RPC use TCP?

What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?

Transcribed Image Text: 9. The heart of the operating system is
f.
b. Device drivers
c. Kernel
d. The fork
e. The threads

When must physical security and information technology (IT) security work together to be deployed, managed, and maintained in an orderly and consistent manner?

In an ideal implementation of a stack, all operations are ______________________ . O(1) O(n) O(n log n) O(n2) it depends on the operation

List and analyze two of the first role actors who were involved in the conception of the internet as a medium of communication.

17/ sum-of-products expression is also known as a_________________ A) minterm expression. B) maxterm Expression C) none of the  given choices D)Minterm or Maxterm

need help wit this quesiton . need explanation of pattern 1. ‘[a-z] (\+[a-z])+’ (a) a+b+c (b) +b (c) x (d) x+1 (e) x+a

In hardware, the failure rate of hardware is quite high early in its life, and this is represented by what kind of curve?

You can use relational operators to compare two DateTime objects and determine which one is earlier or later. Question 46 options: True False

Why do managers’ abilities to access information quickly utilizing a Management Information System differ from the skills offered by a Decision Support System?

None Transcribed Image Text: Which of the data types has the size that is
variable?
a) int
b) struct
c) float
d) double

There are different types of CRM – (Select the incorrect answer) a. Collaborative CRM b. Predictive CRM c. Analytical CRM d. Operational CRM

Java Take a string from user and remove all it’s spaces from starting and end of the string And print the new string

What is the index number of the last element of an array with 9 elements? a) 9 b) 8 c) 0 d) Programmer-defined

Solve the following: Transcribed Image Text: Write the reflexive, symmetric and transitive closure of the relation given below:
B={ c, d}, BRe={(c,c), (d,c)}

Write a Python program that computes the rent in five years and the total rent for one year starting five years from now

Write a c++ program in which 2 string are given. And you have to concate both of them and print ba new string

Why When developing a logical model for a school or college registration system, it is preferable to use a top-down or bottom-up approach.

A user at a terminal types the following commands:
a|b|c&
d|e|f&
After the shell has processed them, how many new processes are running?

When compared to alternative network security mechanisms, such as those at the application layer, what are the advantages and disadvantages of using IPSec?

Can the needs of an organization be met with cloud computing? careful attention is needed to the whole computer infrastructure of the company

Write a program in c language to find the a^b using recursion and you have to take both a and b from user

Application layer offers _______ service a. End to end b. Process to process c. Both of the mentioned d. None of the mentioned

Various systems put disk folders at different track positions on the disk for a reason, right? In each case, what are the benefits?

If a computer is found to have an IP address of 169.254.1.1, what can you assume about how it received that IP address?

breaks the connection to the victim’s machine during a session hijack. a. Command injection b. Monitor c. Session desynchronization d. Session ID prediction

80. The Internet is an example of a. Cell switched network b. circuit switched network c. Packet switched network d. All of above

48. Data flow between two devices can occur in a _______ way. a. simplex b. half-duplex c. full-duplex d. all of the above

The blockchain and cryptocurrencies are all the rage these days. Explain what the blockchain’s underlying technology is and how it relates to cryptocurrencies.

Most computer operating systems have _______ capabilities, which allow them to run two or more tasks, jobs, or applications at the same time.

50. _______ encoding has a transition at the middle of each bit. a. RZ b. Manchester c. Differential Manchester d. All the above

ASSEMBLY With unsigned operands, the CMP instruction sets the Carry flag when the destination operand is less than the source operand. True False

Transcribed Image Text: List FOUR criteria used to measure whether any new information system project is
considered as a success or a failure.

Layer 7 protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? How?

77. The second generation of cable networks is called a(n) _________ network. a. HFC b. HCF c. CFH d. none of the above

Transcribed Image Text: Convert the binary
expansion of each
of these integers to
a decimal
.expansion
11111
33
32 ?
31 ?
30

Primary storage is a Transcribed Image Text: Primary storage is a
Select one:
O a. Nonvolatile
Ob.
O b. Unreliable
Permanent
d.
Volatile

Describe and provide an example of one SQL statement (other than statements already discussed) using Microsoft SQL Server. cannot be create or insert

Are fines or other penalties appropriate for the owners of the zombie machines in order to encourage individuals to properly protect their systems?

Computer Science: What is the difference between starting a data modeling project with a packaged data model on a clean sheet of paper.

Programming language Visual Basic Transcribed Image Text: You can modify the title that appears on the window through the
property. *
Your answer

design a multi_cycle MIPS processor for the following instruction set: lhu (load halfword unsigned) lbu (load byte unsigned) slti (set less than immediate)

#Consider the Merge sort algorithm. Hand –test this algorithm with the following array of words. Man, Cat, Rat, Test, God, Ten, Ant, Kid

Please provide the code for the two problems with simultaneous linear equations 4×4 or 5×5 or higher, and verify the solutions using MATLAB.

Scope ____________ is often achieved by a customer inspection and then sign-off on key deliverables. a. acceptance b. validation c. completion d. close-out

504. ___________ acts as an intermediary between the computer user and the computer hardware a. Software b. Mainframe c. ROM d. Operating System

Which python function is used to find the length of the array. Also provide a simple exmaple for the implementation of that function.

60. There are ________ overlapping stages in the lifetime of large and complex sociotechnical systems. a. two b. three c. four d. five

8 Transcribed Image Text: Which of the following uses scripted HTTP7
O a. HTML
O b. CSS
O c.
XML
O d. Ajax

Matlab Transcribed Image Text: the following script creates a plot of the function z = r0 over the
domain 0<0< 360° and 0

Option one

ii.

  • 0ption two

Explain the following terms as associated with Asymptotic Notations and Analysis of Algorithms. iv. ? Notation(Big Oh) v. ? Notation(omega) vi. ? Notation(theta)

Outline, but do not implement, a recursive solution for sorting an array of numbers. nt: First sort the subarray without the initial element.

81. Response time in time sharing of operating system is usually a. 1sec b. 1sec c. less than 1sec d. more than 1sec

151. Which of the following device copies electrical signals from one Ethernet to another? a. hub b. bridge c. repeater d. passive hub

The appearance of the same copy of data in different location leads to _________. Relationship anomaly Data consistency Data inconsistency Lack in security

In java create a function searchstd() that reads a search record  from a text file file.txt when the function is called in main

None Transcribed Image Text: C/ what is the output of the following code:
for I = eye (3)
disp(‘Value:)
disp(I)
disp(‘END’)
end
MATLAB

What are the purposes of the following application software categories? Project management software Desktop publishing software Database and spreadsheet software Word processing software

Each of the following is a successive layer in which information security is achieved except a. products b. purposes c. procedures d. people

What role will AI play in shaping the future? What are the current Artificial Intelligence software applications? Is artificial intelligence a frightening concept?

– How many 16 K memories can be placed (without overlapping) in the memory space of a processor that has 24 address lines?

UNIX please answer in sentences and examples Why is it safer to remove a directory using “rmdir” than a recursive call to “rm”?

Would it be a good idea to put all of the code to draw your Car in the constructor? Why or why not?

What is the distinction between the java.io and java.nio packages? 2. What is the distinction between an absolute path and a relative path?

With the rise of the Internet, many network experts believe it is crucial to standardize data link layer protocols. Doubtful? Defend your stance.

Which of the following options will cause the execution of your queries to be slowed? Indexes Query Optimizer Linear Search Indexes Query Optimizer

None Transcribed Image Text: Q2: Fill the following blanks with correct words:
1. If DX=0100H, AX=0000H, and BX-0100H; after executing (DIV BX), AX=

Transcribed Image Text: Write a C++ Program to print all the array elements and the maximum number in
array using array of pointers.

In what ways may virtual private networks (VLANs) help an organization? There are several factors to consider (such as scalability, compliance, and expenses).

! please can anyone write for me a univariate and multivariate linear regression in python. you can use your own data. Thank you.

i need the answer quickly Transcribed Image Text: :The command that combines the two tools (line and arc), is
Line
polyline
Arc
circl

Please solve Quickly ?++ Transcribed Image Text: The output will be
{
int i;
unsigned j:
printf(‘\n%d %d”, sizeof (i), sizeof(j) ):
}

Discuss the installation procedure for Windows Server 2012 and how it may be configured for a maximum of ten users in an organization.

Which python function is used to find the length of the array. Also provide a simple exmaple for the implementation of that function.

Transcribed Image Text: Q: 1: Design a database which shows the relationship between the tables of a customer ordering
food in a restaurant.

Clarify what Machine Learning is and why it’s important. What role does it play in analytic CRM? Explain your argument with an example?

Q1/ Create this shape using C++? Transcribed Image Text: Q1/ Create this shape using C++?
* * * **
* ***
* **

Build a C program that computes and prints for the area of circles with different radius inputted.Loop exists when inputted radius is zero.

If you’re talking about a local variable, what exactly do you mean? You may make advantage of local variables in a few statements.

Take input two integers l and r from user and in output print natural numbers from l to r in output. Python language.

10. The MS-DOS operating system is a a. command line interface b. single user interface c. single tasking interface d. all of these

Transcribed Image Text: draw time diagram for write cycle
and specify the content of IO/M,
S1,S0 at time t1, t2, t3, t4 *

(True/False): When an interpreted programme written in language L1 runs, a programme written in language L0 decodes and executes each of its instructions.

Make a truth table for the given statement: p and not q
A. TTFF
B. FTFF
C. FFFF
D. NONE OF THESE ANSWERS

Write a c program to find sum of n natural number using and without using loop. The n must be taken from user

A _____ is a temporary endeavor undertaken to create a unique product, service, or result. a. program b. process c. project d. portfolio

Use DeMorgan’s Law to find and simplify the negation ?? of the following function: ?(?, ?, ?) = ?? + ??? + ????

You as a project manager were asked to develop an Inventory Control Management Information System. Apply the three sphere model for system management

A message stating that your identity or accounts have been hacked may arrive in the form of an email. What do you think?

When it comes to configuring and changing management processes, there is no need for documentation. Is it true or is it not true?

Exactly what do we want to accomplish with artificial intelligence? It may be broken down into various domains with two examples for each.

When process done its task it must notify other processes through: A. Remainder section B. Exit section C. Entry section D. Critical section

Write a C++ program to take input a float value x from user and print the value of 12sin(x) + 23cos(x) in output.

Which of these exceptions will be thrown if we declare an array with negative size? i) IllegalArrayException ii) IllegalArraySizeExeption iii) NegativeArrayException iv) NegativeArraySizeExeption

A new technology which provides the ability to create an artificial world and have people interact with it is called virtual reality why?

Transcribed Image Text: QUESTION 6
A CASE expression may use a
O ELSE
clause
THEN
All of these
END
WHEN
None of these

The ATM cell is a. 48 bytes long b. 53 bytes long c. 64 bytes long d. 69 bytes long View Answer Report

What should we use between a synchronous bus or an asynchronous bus for use between the CPU and the memory? Explain your answer.

199. Process of maintaining a record of project development and maintenance. a. Process documentation b. Product documentation c. User documentation d. System documentation

suppose the rsa cryptosystem is used with the public key (35,7) what is the corresponding cipher text when the plaintext “2” is sent?

The physical equipment made oi various metals, silicon and plastic components that make up the parts of a computer is called hardware explain?

PROGRAMMING LANGUAGE: C++ Transcribed Image Text: Given a =5, b=3, c = 9; a>b && c> a is TRUE.
O True O False

You and your classmates share a hostel. Each has their own computer and wants to exchange info. What network connection method is required?

Create a program using DEV C++ that will convert: Degree Fahrenheit to Celsius and vice versa. Centimeter to feet and inches to feet.

When using vi on Ubuntu, how do you advance the cursor to the first occurrence of the letter t on the current line?

(Intro to Python) Q4. Given two lists a and b, what is the difference between a == b, and a is b ?

None Transcribed Image Text: Let L, = {a*}, L2 = {ba}, L3 = {b^a”}, L4= {b*}. Then
((L2 /L)- L4)-L3 =
%3D
%3D

Describe an algorithm for finding the 10 largest elements in an array of size n. What is the running time of your algorithm?

50. _______ encoding has a transition at the middle of each bit. a. RZ b. Manchester c. Differential Manchester d. All the above

1.) Explain why there could be reasons to believe that Information System and people are the driving force behind developments in Information Technologies.

Q5. Construct LR (0) parser transition diagram for the given CFG. Transcribed Image Text: E ?E+T|T
T ?T * F[F
F ? id

In a full binary tree, find the expected value of the number of edges from a randomly chosen vertex to the nearest leaf.

What is the Unix command that can be used to configure the vsftpd service to automatically start each time the server is started?

In ____________, the operand is provided as part of the instruction. a. Register Addressing b. Immediate Addressing c. Direct Addressing d. Stack Addressing

Digital forensics is concerned with documenting changes to information systems and assessing their potential influence on system security. Is it true or false?

Examine the two schools of thought on information technology definition. Which of these will you choose to study when it comes to automation?

C++ Write a program to print a table for a number the number taken from user. The user entered number must be integer

How does the algorithm for fingerprinting work? To accomplish your goals, one of three options is chosen: block, remove, or allow material use.

Answer Must Be Handwritten Being an IT personel how will you preapre security awareness plan, also expalin the awareness imporatnce in any organization?

Transcribed Image Text: QUESTION 39
Using Priority, what is the finished time of P4?
O11
18
O 28
O None of the choices

State where the following sequences are arithmetic sequence or not. then try to write their hidden patterns

1. 34, 30, 26, 22, …

Which of the following devices takes data sent from one network device and forwards it to the destination node based on MAC address?

233. The transmission media that handle the communication between offices is called a. local loops b. Trunks c. LATA d. local service exchange

Who was the initial developer responsible for Linux? a. Ken Thompson b. Linus Torvalds c. Steve Jobs d. Dennis Ritchie e. Fred Linux

Appreciate the challenges and issues associated with the administration of regulations pertaining to private trucking and the associated reporting to various regulatory agencies

Transcribed Image Text: Question 5
An OSI layer that is responsible for data formatting and translation is known as
Presentation
Session
Transport
Application

12. In which option is the correct naming of asynchronous memory elements given? a)Flip Flop b)Holder or latch c)   Memory Element d) None

If you use CSS to set both a background picture and a background colour, explain how the browser will create the web page.

None Transcribed Image Text: Write a program to print python is best
language for ML, Al using loop for 10
times.
In python

Write a program in python in which a function is returning multiple values and your work to design it nt :think about dictionary

410. Concept of designing computer systems with more than one CPU is known to be a. Multiprogramming b. Multischeduling c. Multithreading d. Multiprocessing

What are the most widely used interior and exterior routing protocols in today’s networks, and how did they come to be so widespread?

Write a program in haskell to make a array of 101 element and store values from 1 to 100 and print that array

Question: Why did you choose each prediction model and a brief description of how it works. Note: Need answer in 4/5 sentences please.

Describe how a menu-driven command processor of the type developed for an ATM application in Chapter 9 could be run on a network.

Transcribed Image Text: Turnaround Time is the interval of time between the submission of a process and its completion.
Select one:
a.TRUE
b.FALSE

Explain the differences and similarities between database management systems and file-based systems, using concrete examples to illustrate each point of comparison and contrast.

i need the answer quickly Transcribed Image Text: 11.The interrupt vector for an INT 60 H instructions is stored at what memory
locations?

Draw a flowchart that accepts two numbers in the range of 0 to 99 and display the sum and difference of the numbers.

In your opinion, what areas of network devices and servers, as well as end node settings, could benefit from greater levels of automation?

________ provides synchronization without increasing the number of bits. a. Scrambling encoding b. Line coding c. Block coding d. None of the above

62. Program background, program functions and computing requirements are part of a. operations detail b. predefined programs c. decision box d. statement box

Q. What are the activities carried out during the requirement analysis? What is the final outcome of requirement analysis? (cse 320 software engineering)

Given the starting point and ending point. Your task is to make a list and then calculate average of this list. In haskell

class Test { public static void main(String[] args) { for (int i = 0; 1; i++) { System.out.println(“Hello”); break; } }} Find output

If the compiler encounters a statement that attempts to modify the value of a constant field, an error will result. True or False.

Using your home network as an example, explain how you would use Personal Firewalls and a Network Firewall to secure your home network?

What are the difficulties associated with enterprise-wide networking? Describe the issues and the solutions to some of the issues that you have encountered.

Write a Python program that takes two int values from user and print the smallest among them. write in python and show output

As far as putting mobile technology into practice, what are the difficulties? In web-based solutions, does the average household save the same amount?

Two common scrambling techniques are ________. a. NRZ and RZ b. AMI and NRZ c. B8ZS and HDB3 d. Manchester and differential Manchester

What were some of the data security and privacy concerns that made the Veterans Administration (VA) and its assets more vulnerable to attacks?

Write a Matlab function to multiply two n-by-n matrices A and B. (Do not use built-in functions.)

Run the script with your codes.

When it comes to data security, what approaches are used that fall under the category of software-based security methods? Detailed discussion is recommended.

C++ Which function is used to check whether a character is an alphabet or number? a) isalpha() b) isalnum() c) isdigit() d) isblank()

Transcribed Image Text: From the case study, draw a use
case diagram that explain the
current scenario at the
Agricultural Contractors
Cooperative (ACC).

How do you insert a page number in a header or footer while keeping its original content and formatting in microsoft word app?

Theory of autometa Transcribed Image Text: If the language
L={a, bus, stop, busstop, abus,busa,busastop, stopbusa, stopabus,.}
f) Write down the alphabet for L?,

171. Choose the RDBMS which supports full fledged client server application development a. dBase V b. Oracle 7.1 c. FoxPro 2.1 d. Ingress

Each and every member of the software development team should participate in the planning process in order for us to achieve what, exactly?

None Transcribed Image Text: Q2: Fill the following blanks with correct words:
1. If DX=0100H, AX=0000H, and BX-0100H; after executing (DIV BX), AX=

What are the difficulties that companies face while attempting to migrate to a cloud-based platform? What are the risks and advantages of participating?

List and analyze two of the first role actors who were involved in the conception of the internet as a medium of communication.

4.3.2.3  Lab – How is the tool steghide useful for a cybersecurity professional? – How can steghide be useful for a threat actor?

Write the difference between (a) Von Neumann and Harvard Architecture Transcribed Image Text: Write the difference between
(a) Von Neumann and Harvard Architecture

#software Transcribed Image Text: 7. Which of these factors may affect
perfective maintenance. [Multiple
Answers]
Team stability
Ethical responsibility
Hardware Specifications
Program structure

What are the purposes of the following application software categories? Project management software Desktop publishing software Database and spreadsheet software Word processing software

Assemblers produce machine code that is executable after it has been link edited. Java compilers produce __________ that is interpreted during its execution.

Modem is the name of the device that converts computer output into a form that can be transmitted over a telephone line? Why?

_______ provides redundancy to ensure synchronization and inherent error detection. a. Block coding b. Line coding c. Scrambling d. None of the above

Can the needs of an organization be met with cloud computing? careful attention is needed to the whole computer infrastructure of the company

Transcribed Image Text: 2. Identify the type of jump , the type of operand , and operation performed
by the instruction.
JNC 10H

_____________software provides a means for managing all the Data associated with the product development, engineering design, production, support, and disposal of manufactured products.

If you use CSS to set both a background picture and a background colour, explain how the browser will create the web page.

What mechanism should I use to insert nodes into a data structure so that insertion, deletion, and searching take less time than O(n)?

subject: data structure and algorithms Q: Construct Binary Trees from given Mathematical Expressions i. T – P / Y ^ (R + G)

C language has some built-in functions in the header file string.h for string manipulation. Explain different types of string handling function with example.

Write a program to reserve an array 7×7, and make the elements of this array like the shape below by using loop only.

Compare and contrast cellular, wireless and wired data connections. Discuss the relevance of high and low mobility, availability, throughput/bandwidth, reliability and connection delays.

Perform the following arithmetic on the hexadecimal numbers 2e2a + 98d1 1244 + 5778 f82e + 2678 1701 + 4242 1ea6 + 1987

Computers science (ST and LBT) Transcribed Image Text: Discuss the strategy, top, Intermediate and
field level syntax errors involved in test case
design.

Write a Fortran program to find the sum of odd Natural numbers in the range 25 to 75. Print the sum in output.

Which of the following sorting algorithm(s) is/are divide and conquer type?

a. Selection sort

b. Insertion sort

c. Merge sort

d. Bubble sort

Transcribed Image Text: Question 38
Which of the following is a LIFO (Last In First Out) data structure?
Liked list
Stack
Array
Queue

206. A user who have no access to data is called? a. Authorize User b. Allowed User c. Over User d. Unauthorized User

I need the answer as soon as possible Transcribed Image Text: Rust
Make a string variable and print that string
variable in rust

class Test { public static void main(String[] args) { for (int i = 0; 1; i++) { System.out.println(“Hello”); break; } }} Find output

Take input a string and print it in reverse. Note- don’t modify the string, just print it in reverse order. Language – C++

28. The three levels in QoS are : a. Best effort service b. Soft QoS c. Hard QoS d. All of the mentioned

Transcribed Image Text: Using variable size code, find Huffman Code for each character.
Characters
Frequencies
10
e
15
12
3
4
13
1

Discuss the installation procedure for Windows Server 2012 and how it may be configured for a maximum of ten users in an organization.

The next section describes in detail how each of the fundamental concepts of the cybersecurity discipline is utilized to achieve overall system security.

Which of the following options will cause the execution of your queries to be slowed? Indexes Query Optimizer Linear Search Indexes Query Optimizer

95. In symmetric multiprocessing system N number of CPU can run a. N-1 processes b. N+1 processes c. N processes d. N-2 processes

Don’t copy from google or other websites How is the wastage of bandwidth in Synchronous TDM overcome by Statistical-TDM? Explain with an example.

Construct a simple CALCULATOR. Submit a document which contains the following: Software Specification Software Design Program Code Lines (Java or any OO Language)

Write a C++ statement that declares secretList to be a vector object to store integers. (Do not specify the size of secretList.) (4)

What is the layered approach to operating system design? What are the benefits and drawbacks of this approach? Briefly describe using an example.

Create a struct named Rational with members int p,q and then: Write a function that returns the sum of two rational numbers. C++

Q: It can be in Ambiguous Grammar, but what Grammar can generate this: Transcribed Image Text: L-{n10Z,in binary?
SHOT ON POCO X3 NFC

Write a C++ program to input two months number and print the sum of number of days in these two months. (Using Functions)

384. Security features offered by a file oriented approach, are of a. Field level b. File level c. Record level d. Entity level

Help me writing the following program. Write a python program to check the file size. By using os module By using pathlib module

Most computer operating systems have _______ capabilities, which allow them to run two or more tasks, jobs, or applications at the same time.

Is it possible to increase RAM size to enhance overall process execution performance? What are the advantages and disadvantages of increasing RAM size?

Using VB ReadOnly is a keyword indicates that a property’s value can be displayed but not changed by an application. True or False?

Explain what is meant when we say that a program or system is memory bound. What other types of bindings have we discussed?

Transcribed Image Text: Where does the execution of the program
?starts
user-defined function
void function
main function
else function
O O O O

Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ?

I need the answer as soon as possible Transcribed Image Text: Show using an
example how to implement a queue using two stacks.

Overloading is achieved when two or more methods in the same class have the same: return type parameter type method name method signatures

A __________ is a Boolean variable that signals when some condition exists in the program. a. flag b. signal c. sentinel d. siren

Rust An smiling emoji is given you have to print this before creating a object of char and then put it into it

86. In programming, programmers use comments to a. highlight program modules b. explain module functions c. explain used variables d. all of above

If you have a generic class : public class Search how can you find all the occurences of B in the search

C++ Transcribed Image Text: Q2:a) What is the output of the following program?
Void main()
{for(int i=4;i>=1;i–)
{ for(int j=1:j<=i:;j++) cout< using namespace std; int main() { char ch=’x’; cout<<&ch; return 0; } Q: Write down three real life applications of stacks. NOTE: WRITE IN YOUR OWN WORDS PLEASE DON’T COPY FROM GOOGLE & EXPLAIN BRIEFLY. When data are transmitted from device A to device B, the header from A’s layer 4 is read by B’s Transport layer. Why? Explain how the three properties of big data (volume, velocity, and diversity) relate to the data gathered by Mercy and other healthcare organizations. Consider how the personal computer and the Internet have changed system design. If at all feasible, include instances to back up your claims. Question Briefly explain FIVE (5) components of an information system. Provide ONE (1) example for each of the components in a library system. public cloud refers to cloud services offered by a (an) a) Organization b) Internal administrator c) An Internet service provider d) Third party Transcribed Image Text: 4 In the following grammar the useless variable(s) is/are: S–> Ab
?–> ?
A–> Ab|b|cC|Dc
C–> cC[c
D–>Dcc
A
B.

Please answer without plagiarism Transcribed Image Text: QI: Draw and explain the difference for a computer spstem with UPS and without UPS ?

Describe the most important features of information in your own words. What role do they play in the field of computer security research?

What do you mean by op code and operands in assembly language. Please give suitable examples of the assembly language code with it.

Give an example of what you mean by PRODUCT in relation to one of the eight principles of the ACM/IEEE Code of Ethics.

Membership in a VLAN can be based on _________. a. port numbers b. MAC addresses c. IP addresses d. all of the above

Explain the hierarchical pyramid (classification) of memories in terms COST, Capacity and Speed (access time). Provide the mentioned features to each memory type.

Using the main processes involved in information systems development, illustrate how you will develop and implement a business information system for your organization?

Transcribed Image Text: 9.
to read data from data reader (dr1) just one
time,, we write the following statement:-
dr1.read(1)
dr1.read()
dr1.executereader
none

Transcribed Image Text: Discuss the concept of interned strings found in the Java language. Provide a short
source code example of interned strings.

please snap a clear solution Transcribed Image Text: document.write( (Math.floor (Math.random () *2)-2) *10);
choose One
{-10.-20}
-20 . -40
-5.-10.-20.0
[-10.- 20]

Explain how the convergence of computers, telecommunications, and media has resulted in the development and growth of disruptive technologies and applications like Amazon.

Transcribed Image Text: Take input
Note- n>=1. In C++
interger
n from user and print the sum of the digits of n.
a

49. Function definition and first level refinement are part of a. program design b. program statement c. program calculation d. printing the program

In mobility what do you mean by Address migration and Migrating locality? 2. What is mobile agent? Discuss the characteristics of mobile agent.

Which of the following is not a machine independent code optimization technique:- i) Loop optimization ii) Folding iii) Constant Propagation iv) Peephole optimization

What is the distinction between the java.io and java.nio packages? 2. What is the distinction between an absolute path and a relative path?

I need the answer as soon as possible Transcribed Image Text: The implementation of procedures by operating systems is beyond our purview, right?

Computer Networking Find the class for the given IP address 185.75.255.10 1. Class B 2. Class A 3. Class C 4. Class D

Transcribed Image Text: For a 4-variable k-map, which of the following is not adjacent to minter m14?
a)6
b)10
c)12
d)15
e) 13

Given the language L(r) defined over the alphabet ? = {a,b}, where r = (0011)* , define a PDA that accepts L .

in C++ Write an inductive function, called IndFn, for adding 12+10+8+6+4 Write a function with a procedural loop, called ProFun, for adding 14+12+10+8+6+4;

Transcribed Image Text: Do you think it is possible to show the start and the end of a bit? explain how?
Your answer

1. The physical layer is concerned with the movement of _______ over the physical medium. a. programs b. dialogs c. protocols d. bits

Create a MIPS program that creates a Marquee effect square that is able to be moved to the left, right, up and down

I am unable to read a complete single line sentence as input in C++. Using cin it’s reading first word only. Please help.

What is the basic operation of closest pair algorithm using brute force technique? a Euclidean distance b Radius c Area d Manhattan distance

104. If you want your database to include methods, you should use a _____ database. a. Network b. Distributed c. erarchical d. Object-Oriented

6. Which transition you can use to change a node from one color to another?
a. FillTransition
b. OpacityTransition
c. PathTransition
d. FadeTransition

Transcribed Image Text: Consider the following binary search tree T
12) 16
ii. Redraw the tree after deleting value 8 from tree T.

_____________software provides a means for managing all the Data associated with the product development, engineering design, production, support, and disposal of manufactured products.

What’s the url of a private network? Should a datagram containing a private network address ever appear on the broader public Internet? Explanation.

63. In an HFC network, the upstream data are modulated using the _______ modulation technique. a. QAM b. QPSK c. PCM d. ASK

mobile programing,android studio,java Transcribed Image Text: To import AndroidViewModel, which from the following is correct
import androidx.AndroidViewModel:
import android.lifecycle.AndroidViewModel:
import androidx.lifecycle.AndroidViewModel;
import androidx.annotation.AndroidViewModel;

Transcribed Image Text: Question 19 (1 point)
Listen
The primary advantage of static type binding is that it provides programming
flexibility.
True
False

Exercice involving databases and database users Give examples of systems where traditional file processing, rather than a database approach, may be more appropriate.

Show me how to use h1 heading tag in HTML. Use the heading as: “HTML Headings” Write HTML code and show output screenshot.

23. _______ data have discrete states and take discrete values. a. Analog b. Digital c. (a) or (b) d. None of the above

Transcribed Image Text: Question 5
Which of the following is used for cache memory?
DRAM.
a.
SRAM.
b.
PROM.
C.
Flash Memory.
d.

What is the purpose of an online form, and what are the functions of the controls and widgets in a web form, exactly?

For capturing directory accesses, you are provided two bits. In what ways would you make use of the four operations at your disposal?

Need correct explanation complete question What are the basic advantages of using interrupt-initiated data transfer over transfer under programmed control without an interrupt?

You have to use nested if else Compare three given number which is largest and print that. The code must be in java.

Using examples, describe how industry-standard people practices are coupled with controls and linked with information security principles to create an information security function.

Determine the amount of time delay between the serial input and output of the 8-bit (SISO) shift register. If the clock frequency 2MHz.

206. The Very high-bit-rate Digital Subscriber Line’s (VDSAL) downstream rate is a. 768 kbps b. 1.5 Mbps c. 1.5-6.1 Mbps d. 25-55 Mbps

Identification and brief discussion of the purpose of some of the tools and methods utilized in the system development process will be required.

Transcribed Image Text: Which CSS property can be used to define a solid border around a div?
O border- decoration
border-style
border-color
border-line

Sorting is a fundamental problem associated with arrays that seeks to locate in the array where target element is.

Select one:
True
False

If 2 dimensions is a grid, and 3 dimensions is a cube, how would you picture the 4th dimension? The 5th? The 6th?

What mechanism should I use to insert nodes into a data structure so that insertion, deletion, and searching take less time than O(n)?

use assembly language 8086 to implement the following equation using arithmetic instruction AX=(((BX*DX)/CX) , (BX=10,CX=5 ,DX=5) and store result in B9000 location address

digital design Transcribed Image Text: Which of the following diagrams doesn’t represent the function (F=AB+CD)?
Select one:
😀
A –
F
😀
A

determine whether or not each of the following is true. Prove it if true, if not true give a counterexample. (b) (A?B)?C= (A?C)?(B?C).

Write a program to add element in the start of an array. Consider array and adding element are given to you In JavaScript

What is the code in R studio to make an elbow chart to find the optimal value of k in k- means clustering.

Transcribed Image Text: What could happen when a clause appears twice in the same
Side effect
predicate?
Double effect
Prediction
O Double precision

154. Device controller is the controller of the computer system that contains a. buffers b. registers c. cache d. both a and b

TELECOMMUNICATIONS (The first geostationary satellite, Syncom III , was successfully launched in 1963) Outline three sources of noise in a satelite communication media

Answer this problem in matlab Transcribed Image Text: Q2: A program to calculate the sum of squares of numbers from 1 to n.

Most computer operating systems have _______ capabilities, which allow them to run two or more tasks, jobs, or applications at the same time.

Explain about multi – entry and multi -exit routines , conversion of multi entry routine to single-entity routine and fundamental path selection criteria

Assemblers produce machine code that is executable after it has been link edited. Java compilers produce __________ that is interpreted during its execution.

Lesson: Application of Computer Graphics What is the difference of ray casting and ray tracing? Which extra rays are used in ray tracing?

6 What is the default font used in MS Word document? Select one: a. Algerian b. Calibri c. Arial d. Times New Roman

Transcribed Image Text: Use Newton’s Method to determine x5 for f(x) = x³ – 7x² + 6x – 2 if xo = 4.

_____________software provides a means for managing all the Data associated with the product development, engineering design, production, support, and disposal of manufactured products.

An example of ________is not revealing the type of computer, operating system, software. and network connection a computer uses. a.obscruity b.limiting c.diversity c.layering

Is it permissible for a local variable in one function to have the same name as a local variable in a different function?

Utilizing Don Norman’s conceptualization of user difficulties, discuss how formative evaluation can be utilized to resolve the user difficulties and improve the usability

What role will AI play in shaping the future? What are the current Artificial Intelligence software applications? Is artificial intelligence a frightening concept?

Transcribed Image Text: QUESTION 8
Columns added to a table in transform data can be seen in the Data View?
O True
False

subject: Digital Logic &Design Q: Draw the and-or logic circuit using the input (A, B, C) and output (X) waveforms in Figure 01.

Note:- any wrong Answer will downvote Construct a DFA accepting the language: {W€{a, b}*: W has neither aa nor bb as a substring}

Correct and detailed answer will be Upvoted else downvoted Java program to print the following given pattern Pattern: 5432* 543*1 54*21 5*321 *4321

How many characters are in each of the following character and string constants? a. ‘\n’ b. ‘n’ c. “Mary” d. “M” e. “Mary\n”

In emu 8086……Write the instructions to put the sum of 0+4+8+…. +64 in the DX register. (No need to write the entire program)

Write aprogram in assembly language, which will vertically display all 52 ASCII alphabet characters (A-Z and a-z)on thescreen (one character in a line).

i need the answer quickly Transcribed Image Text: Q1/ write a program to draw a truth table of the following logic circuit:
BD

Which python function is used to find the length of the array. Also provide a simple exmaple for the implementation of that function.

Mandatory Access Control describes an access control mechanism that allows the data owner to create and administer access control.

Select one:
True
False

Transcribed Image Text: A Draw a flowchart to print the sum and the average of all odd integer
numbers between n and 90.

Follow the evolution of system architecture, with a focus on the effect of the personal computer and the Internet. Include examples if possible.

1) Write C program and aslo draw the flowchart to take input the side of a square and print its area in output.

Use AI in healthcare, agriculture, schools, entertainment, and the military, among other applications. Give examples to show the connection in a brief explanation.

99. The relational model uses some unfamiliar terminology. A tuple is equivalent to a: a. record b. field c. file d. data base

What storage media would you suggest to a classmate for safe and flexible storage of the application files utilized in this course? Justify.

Describe the components of a back-up strategy. When it comes to backup plans for mobile devices and desktop computers, how do they differ?

Then, using examples and explanations, prove your points by identifying the five most difficult obstacles in creating and delivering an engaging data visualization.

Transcribed Image Text: If a computer is capable only of manipulating and storing integers,
what difficulties present themselves? How are these difficulties
overcome?

How to avoid being duped by phishing attacks on your network what precautions should we take to avoid another assault of this nature?

State what the following are and explain how each would be useful to a business: i. Voice messaging ii. Cloud computing iii. Telecommuting

JAVA PROGRAMMING 1. What is your understanding about System.out.println()? 2. What do you think Java Technology does platform improve on other language platforms?

4)Which of the following is a Character data type in Python?

a.
str

b.
complex

c.
all the these

d.
int

Python 3

An object is a so ftware entity that combines both ____ and ____ _ in a single unit. 6. An object is a(n)

The term_________is sometimes used to identify anyone who illegally breaks into a computer system. a. hacker b. cyberterrorist c. Internet Exploiter d. cyberrogue

CS register belongs to _____. a. Neither EU nor BIU unit b. BIU unit c. Both EU and BIU unit d. EU unit

when a software calls a virtual function using base class pointers or references in order to utilize the same function with various forms/structures

When it comes to configuring and changing management processes, there is no need for documentation. Is it true or is it not true?

The Colonial Adventure Tours database will be used. How many bookings have a travel cost of more than $20 but less than $75?

If a class is declared abstract, why would someone do that? How can interfaces assist you in achieving multiple ancestry via multiple inheritance?

Write a python program that accepts an integer(n) and computer the value n+nn+nnn+nnnn For example input is 10 and output must be 10203040

Write a Java program that prints the list of characters between two characters a and b given by the user and supposed ordered.

None Transcribed Image Text: Q2: Fill the following blanks with correct words:
1. If DX=0100H, AX=0000H, and BX-0100H; after executing (DIV BX), AX=

Can you tell me whether there is a distinction between incremental and iterative development? Explain each of these using your own personal experiences.

Why have power supply and heat dissipation limits become such a significant design restriction for microprocessors and their associated systems over the years?

1. The physical layer is concerned with the movement of _______ over the physical medium. a. programs b. dialogs c. protocols d. bits

In 8086, instruction queue is a part of _____. a. neither EU nor BIU b. BIU c. both EU and BIU d. EU

Computer Networks Find the range of addresses in the following blocks. Explain the complete logic? a. 123.56.77.32/29 b. 200.17.21.128/27 c. 17.34.16.0/23 d. 180.34.64.64/30

Name two types of methods that you can only add to an interface with Java 8 or later and the advantages they provide.

111. Connectors used to connect flowchart symbols to one another are classified as a. arrow lines b. symbols c. annotation d. special symbols

11. C language Prompt the user to enter an integer n and find if the number n is a fibonacci number or not.

Ubuntu Topic 1: What Ubuntu features do you like the best? Why? Topic 2: What Ubuntu features do you like the least? Why?

278. In graphical user interface users uses a. command line interface b. voice based interface c. file based interface d. mouse based Pointing

9 Transcribed Image Text: The minimum bandwidth required to send a digital signal of bit rate 500 kbps is roughly equal to
kHz,

83. Which of the following is an unordered collection of elements that may contain duplicates? a. Set b. Bag c. List d. Dictionary

(1) What role does IP addressing play in the BGP routeing protocol? (2) What role does physical topology play in all of this?

Create a trigger named trg_line_prod that automatically updates the quantity on hand for each product sold after a new LINE row is added.

Show that if n is an integer and is odd, then n is even using A proof by contraposition A proof by contradiction

When compared to alternative network security mechanisms, such as those at the application layer, what are the advantages and disadvantages of using IPSec?

Transcribed Image Text: B. Answer with (True or False) the following,
and I=3)
(A=10 , B=5 , K=4, J=0.5
use
(A/B*J.GT.1.OR. K.GE.B).AND.(K**J.LT.3.OR. .NOT.I.NE.3)

14 meows per second = ___ woofs per minute  (1 woof = 7 meows, 1 minute = 60 seconds)    720 woofs per minute

If there is Machine Learning, are algorithms and data structures still utilized today? Are they no longer in use or are they obsolete?

Is the static priority scheduler as effective as the earliest deadline scheduler for task durations that are Harmonics? An example “for” or “against”

Which of the following terms means to divide an application’s code into small, manageable procedures? 1. Break 2. Modularize 3. Parameterize 4. Bind

Transcribed Image Text: _is a property of the entire relation,
A_
rather than of the individual tuples in which each
tuple is unique.

Why SWOT analysis is important for e-business strategic managers? Select one: a. avoids threats b. attracts customers c. motivate staff d. market products

9 From a business perspective, a consistent, sustainable implementation of e-government is highly relevant for the economy Select one: a. True b. False

None Transcribed Image Text: Write a program to print python is best
language for ML, Al using loop for 10
times.
In python

Determine whether statement forms p ? (q ? r) and (p ? q) ? (p ? r) are logically equivalent. Justify your answer.

the typical architecture of the master data and its components in SAP ERP, and explain its importance in Sales and Distribution (S&D) module.

Discuss four (4) main types of computer crimes and provide computer security measures that can be implemented to avoid each of these crimes?

None Transcribed Image Text: Express the decimal number -12 as an
8-bit number in 1’s complement:
00001100
11110011
No correct answer
11110111
00000011

What is the name of the word that is used to refer to the comparison of computer outputs with the matching input documents?

Can someone elaborate on the protocols used at each level of the TCP/IP Protocol Suite and the purposes for which they are utilized?

115. The fastest form of inter process communication provided in UNIX is a. Virtual Memory b. Memory c. Shared Memory d. Main Memory

38. Which of the items listed below is not one of the software engineering layers? a. Process b. Manufacturing c. Methods d. Tools

Is this statement true or false? You may store items in a ListBox by adding them to the Text property of the control.

Transcribed Image Text: Write a php program to remove duplicate
from a sorted list.
List is given to you don’t take from user

What are the different types of Start-Ups? Explain in your own words with an example the difference between Breakthrough innovation and Technical innovation?

DO NOT COPY FROM OTHER WEBSITES Q. Activity diagrams are examples of a………… a- Mathematical modelling b- Physical modelling c . Graphical modeling

i need the answer quickly Transcribed Image Text: Q)write and opply a program incttto
test any The for
numbey
amu Itsple of another

In Role based Access control, the users are not assigned permissions directly, but only acquire them through their role.

Select one:
True
False

Transcribed Image Text: Q4) Write a Mat Lab program to evaluate 25 terms of the following series
xxxX
S=1-
2!
4!
6!
8!

principles of information security Contingency planning, Disaster recovery, and business continuity are pure management activities. Explain what makes it part of information security?

Explain the hierarchical pyramid (classification) of memories in terms COST, Capacity and Speed (access time). Provide the mentioned features to each memory type.

What were some of the data security and privacy concerns that made the Veterans Administration (VA) and its assets more vulnerable to attacks?

What is an interwoven collection of hardware and systems software that must work together to reach the final objective of executing application programs?

Transcribed Image Text: What is the output of the following C++ code?
double num = 11.;
cout << static_cast (num /2. + 1.);

How can you use netstat to identify an infection? Is there any security risk for the ports that are current in LISTEN status?

The truth tables for: ( A XOR B NOR C NAND D OR B) AND ( A AND D) Please explain the steps

Write a C++ program to count the occurrence of a particular character in a text file. Your program should prompt for the character.

Transcribed Image Text: If an exception occurs within a try block, the rest of the try block is ignored.
A) True
B) False

What output will be produced by this code segment: int x = 2; while (x < 100) { System.out.print(x); x = x*x; } Transcribed Image Text: 13 Which of the following is a Flip-Flop? () All answers are correct O S-R O D OT ) J-K Transcribed Image Text: Write a nested for loop to print a shape as follows. ***** **** * ?* *** ** * **** ***** Provide the detail explanation of all steps involve from capturing a scene to the acquisition of a digital image? All steps are important? Technological change has become pervasive and can be both creative and disruptive. Provide four examples of recent technological developments with vast commercial potential. 133. Word processing, spreadsheets, multimedia, graphics all are examples of a. scientific software b. engineering software c. embedded software d. product line software class Test { public static void main(String[] args) { for (int i = 0; 1; i++) { System.out.println(“Hello”); break; } }} Find output Q8. Build FA’s for any two of the following languages. (ab*a + b)* (b + ab)*(a + ?) (a + b)*(a + bb) For the control connection, FTP uses the __________ character set. a. regular ASCII b. EBCDIC c. NVT ASCII d. none of the above Is a real-time graphics environment required for a flight simulator program used to educate pilots how to fly an airplane? Explain your answer. Take input a string from user and reverse it without using any library functions. Print the reversed string in output. Code in C++ Why do you suppose the method area of a JVM is global to all of the threads running in the virtual machine environment? Prompt the user to enter 3 strings and then from those three strings, print the string with smallest length in output. Language- Python Can you tell me whether there is a distinction between incremental and iterative development? Explain each of these using your own personal experiences. If you use CSS to set both a background picture and a background colour, explain how the browser will create the web page. Write a program in Rust programming language to print the string given below 5 times in separate lines. “Printing string in Rust. “ Write a Scala program to get the character at the given index within a given String. Also print the length of the string. Why we will evaluate any business model and how we can perceive our business solution that will provide actionable insights to the business. Write a recursive program in C language to find the sum of first 50 natural numbers. Use recursion only else I will dislike. If you use CSS to set both a background picture and a background colour, explain how the browser will create the web page. The ReadableByteChannel instance allows us to read from the Buffers in Datagram Socket using its read method. Select one: a. True b. False URGENT FOR JAVA Write a Java method that makes following calculation. f(n)= 1! – 2! + 3! – 4! + 5! ….. n! FOR JAVA Write a method that takes two integer arrays, and returns a new array by taking the intersection of the two arrays. Transcribed Image Text: ii. How multiple Primary Keys and / or Multiple Foreign Keys are created ERD. Explain with help of Real-time Example. Using a diagram and a brief explanation, explain how a transistor works. What is the main difference between an NPN and PNP configuration? consider the code: import numpy speed = [100,86,88,88,111,86,103,87,94,78,77,85,99] x = numpy.median(speed) print(x) the results? Select one: a. other b. 103 c. 88 d.90.92 QUESTION Why is it essential and imperative to first understand and know how business process works before development of an information system begins? It’s urgent please solve quickly. Write a assembly code program to move a character on the output screen based on the keys [4=left,8=up,6=right,2=down]. 213. Linux uses System Calls to request a specific a. UNIX Service b. Kernel Service c. Window Vista Service d. Microsoft Windows Service None Transcribed Image Text: Q2: Fill the following blanks with correct words: 1. If DX=0100H, AX=0000H, and BX-0100H; after executing (DIV BX), AX= Web designers use non-animated GIFs and rich media assets to create their advertising banners. Choose one of the following options: True or False. Outline a transaction scenario that may lead to a deadlock in a distributed system and propose a scheme whereby deadlocks may be avoided. what tool allows a user to create there own recurring tasks to be run automatically? a) at b) atq c) atp d) crontab What do you think of when you hear the term “programming style”? Are there any common guidelines for what constitutes excellent programming style? Transcribed Image Text: State a method for selecting a specific element (singular) and provide the example code for how the method is implemented. Give an example of what you mean by PRODUCT in relation to one of the eight principles of the ACM/IEEE Code of Ethics. write a brief description of each part of a Technical Paper. Also in the CITATION part, write the rules in citing a paper. Suggest a suitable antenna for high-speed internet access provided by the cellular networks. Explain the reason to choose the antenna for this application Transcribed Image Text: Describe the processes tree in a Linux system including at least two processes created by init (i.e. what they do). Utilizing Don Norman’s conceptualization of user difficulties, discuss how formative evaluation can be utilized to resolve the user difficulties and improve the usability What is the layered approach to operating system design? What are the benefits and drawbacks of this approach? Briefly describe using an example. The blockchain and cryptocurrencies are all the rage these days. Explain what the blockchain’s underlying technology is and how it relates to cryptocurrencies. I need the answer as soon as possible Transcribed Image Text: n2 Example 1 Find O bound for f(n) : n = – Java OOP? YOU ARE REQUIRED TO DESIGN A SCENARIO WHICH EXPLAINS THE CONCEPT OF INHERITANCE. MAKE SURE TO COVER ALL TYPES OF INHERITANCE. Transcribed Image Text: 5. Prove that (p ? r) ^ (q ? r) = (p V q) + r using a truth table. What is the command to use the System File Checker to immediately verify system files? To verify system files on the next restart? Java programming- WAP to print all lowercase alphabets whose ASCII value is multiple of 3. In Java language. Attach code and output screenshot. Is the static priority scheduler as effective as the earliest deadline scheduler for task durations that are Harmonics? An example “for” or “against” Create a C++ program that will ask for an input integer which will determine if the number is divisible by 5 or not. The process of matching a method call with the correct method is known as . 1. matching 2. binding 3. linking 4. connecting In C++ take input two char variables from user and find the difference between their ASCII value. Display the obtained result in output. 173. Website design and implementation is example of technology targeted at a. application domain b. technology domain c. broad based d. broad band Discuss the mindset of a virus creator. What, in your view, motivates someone to create a virus and spread it to computer users? Should you use EBP to address an array in 32-bit mode or should you use EBP to address an array in 64-bit mode? _______ is the most widely used local area network protocol. a. Token Ring b. Token Bus c. Ethernet d. none of the above 50. In which of the following usually a front end processor is used ? a. Virtual storage b. Timesharing c. Multiprogamming d. Multithreading FILL IN THE BLANK A common pattern to run a subprogram within a program is first to________ the process and thenexec the subprogram Transcribed Image Text: What will be the output of the following code? void main () { int a[10]; printf(“%d %d”, a[-1], a[12]); } What is the distinction between the java.io and java.nio packages? 2. What is the distinction between an absolute path and a relative path? True or False : You can cause a control to be skipped in the tab order by setting its TabPosition property to False. Python: Write a program that accepts a sequence of words separated by whitespace as input to print the words composed of digits only. None Transcribed Image Text: Write a program to print python is best language for ML, AI using loop for 10 times. In python Write a C++ program to find the number of alphanumeric characters in any string taken input from user. Print the result in output. Transcribed Image Text: a Considering the operator U find the matrix representation of the following circuits; a) b) d) U U U U What is an interwoven collection of hardware and systems software that must work together to reach the final objective of executing application programs? 50. _______ encoding has a transition at the middle of each bit. a. RZ b. Manchester c. Differential Manchester d. All the above 211. The dialogue techniques for terminal use do not include a. form fillings b. menu display c. open-ended questions d. questions and answers Differentiate spoofing from session hijacking. Assuming yourself as a web user, list any two countermeasures you take to prevent you from session hijacking. Transcribed Image Text: Determine the switching function of the threshold element shown in Figure 9.13. -2 F -2 Figure 9.13 Threshold element. 1/2 Write a Function in C++ named even that receives an integer number x and print all even number between 1 and x inclusive. java Transcribed Image Text: “Wrapping code and data together into a single unit” Comment on this and give an example for the same. Correct and detailed Answers will be given Upvoted else down voted Briefly explain about the contents of client and server programs of RMI. Each year we are given a PDR or Personal Development Report which uses our 7 core values to evaluate your year of work List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware. 64. When you delete an object, windows XP sends it to a. my documents b. recycle bin c. my computer d. trash folder What are three characteristics of big data and how do they relate to the information collected by healthcare practitioners, such as mercy data? Take a string from user and you have to remove all the characters except the alphabet from that string. In c++ programming language. Transcribed Image Text: “If there are 3 clauses, how many tests are needed in combinatorial coverage?” 5 96 ? O O O C How is the tool nmap useful for a cybersecurity professional, but could also be useful for a threat actor? Write 3 sentence explanation